Analysis
-
max time kernel
67s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2022, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IMG-SCAN28202209.exe
Resource
win10v2004-20220901-en
General
-
Target
IMG-SCAN28202209.exe
-
Size
23KB
-
MD5
4ab9b88c610ff3fbe511aaf8f1c1294c
-
SHA1
b7c9e2df72ef925ff48cd6d4b125bc72e2dd12e5
-
SHA256
fcba45047433ffcc247b656b941e4fb517fb0a6582a01543a6e25bf774dfd11a
-
SHA512
e3aab0975fc27efb3783c70e7bdf347edd07edd531f3da8741ef3f61450305b7e6b983b4aac7fec49f5f459e6f69766e4bebc4e3840dc87d76258c00eac9e106
-
SSDEEP
384:73XELB28wj8veCinbQ4vlid7TEPVoyQLkopnW:kGjBDdvlid74PpQL9pW
Malware Config
Extracted
remcos
NEW
remcapi.duckdns.org:2028
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
FILE.EXE
-
copy_folder
work
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-L9LQMY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
file
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run IMG-SCAN28202209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\file = "\"C:\\ProgramData\\work\\FILE.EXE\"" IMG-SCAN28202209.exe -
Executes dropped EXE 1 IoCs
pid Process 4904 FILE.EXE -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation IMG-SCAN28202209.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation IMG-SCAN28202209.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FILE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\APP = "\"C:\\Users\\Admin\\AppData\\Roaming\\APP.exe\"" IMG-SCAN28202209.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5016 set thread context of 4144 5016 IMG-SCAN28202209.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings IMG-SCAN28202209.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4244 powershell.exe 4244 powershell.exe 4212 powershell.exe 4212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5016 IMG-SCAN28202209.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 4904 FILE.EXE Token: SeDebugPrivilege 4212 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4244 5016 IMG-SCAN28202209.exe 89 PID 5016 wrote to memory of 4244 5016 IMG-SCAN28202209.exe 89 PID 5016 wrote to memory of 4244 5016 IMG-SCAN28202209.exe 89 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 5016 wrote to memory of 4144 5016 IMG-SCAN28202209.exe 102 PID 4144 wrote to memory of 3564 4144 IMG-SCAN28202209.exe 103 PID 4144 wrote to memory of 3564 4144 IMG-SCAN28202209.exe 103 PID 4144 wrote to memory of 3564 4144 IMG-SCAN28202209.exe 103 PID 3564 wrote to memory of 3576 3564 WScript.exe 104 PID 3564 wrote to memory of 3576 3564 WScript.exe 104 PID 3564 wrote to memory of 3576 3564 WScript.exe 104 PID 3576 wrote to memory of 4904 3576 cmd.exe 106 PID 3576 wrote to memory of 4904 3576 cmd.exe 106 PID 3576 wrote to memory of 4904 3576 cmd.exe 106 PID 4904 wrote to memory of 4212 4904 FILE.EXE 107 PID 4904 wrote to memory of 4212 4904 FILE.EXE 107 PID 4904 wrote to memory of 4212 4904 FILE.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG-SCAN28202209.exe"C:\Users\Admin\AppData\Local\Temp\IMG-SCAN28202209.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\IMG-SCAN28202209.exeC:\Users\Admin\AppData\Local\Temp\IMG-SCAN28202209.exe2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\work\FILE.EXE"4⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\ProgramData\work\FILE.EXEC:\ProgramData\work\FILE.EXE5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD54ab9b88c610ff3fbe511aaf8f1c1294c
SHA1b7c9e2df72ef925ff48cd6d4b125bc72e2dd12e5
SHA256fcba45047433ffcc247b656b941e4fb517fb0a6582a01543a6e25bf774dfd11a
SHA512e3aab0975fc27efb3783c70e7bdf347edd07edd531f3da8741ef3f61450305b7e6b983b4aac7fec49f5f459e6f69766e4bebc4e3840dc87d76258c00eac9e106
-
Filesize
23KB
MD54ab9b88c610ff3fbe511aaf8f1c1294c
SHA1b7c9e2df72ef925ff48cd6d4b125bc72e2dd12e5
SHA256fcba45047433ffcc247b656b941e4fb517fb0a6582a01543a6e25bf774dfd11a
SHA512e3aab0975fc27efb3783c70e7bdf347edd07edd531f3da8741ef3f61450305b7e6b983b4aac7fec49f5f459e6f69766e4bebc4e3840dc87d76258c00eac9e106
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5c3f11ef5900baba5d05489731c759b2a
SHA1744b2032ecea6051e28b941209a14473b8f670ea
SHA256e44ff1fa3a6ff553638ec842a3402b36a80cbde943f49881b11a3308dcfc5971
SHA5120a2b9c701ef924fe4e0aa9b14f821607262d91337cce98e8782192cae4a2bdcc2ef426ebf037ba88f6992122db7e7a48d68576ae3dfc0e88a3fa285e93d388d0
-
Filesize
522B
MD5bea79706ca85b348ac847100f6d55906
SHA16f49d9f95306def7f974cc92a78ee01226565c82
SHA256dcc0f0a231657ac2e354b10791e7b7e848b82fce86170345628348d73642b4ea
SHA512997bcb3a81f7029fb651f2ac50db7a849e47674a6a05c8ca72acbf6859cb7dd68f0cfe74d7f7691de2856f1f991e7d68dbd8c7cc2090d44521f56d8c6cfca0ee