Analysis
-
max time kernel
152s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
e891b42605aed838a3c8e5be6e5bf491.com.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e891b42605aed838a3c8e5be6e5bf491.com.exe
Resource
win10v2004-20220812-en
General
-
Target
e891b42605aed838a3c8e5be6e5bf491.com.exe
-
Size
1.3MB
-
MD5
2385e8dfbfb88478214c112b5752da42
-
SHA1
bcfd36722ac110657b8629359d0a85d91dfc4158
-
SHA256
5323dc8bea28e435e02e60851888f0bec221a2e89128443f985a3adc1ff12353
-
SHA512
63bb666ff1bb875ed0988fc15963d8ee72b8dd41feb6726d526af0b6cb8bfe89a5cf1a1a20e997dc4e0d05718e9c756e843a2f2bfd78642fa59173e25bf4a007
-
SSDEEP
24576:0AOcZ2i7SEOWDLUpG8hCyJV0TB4PQdTr+Mo5pemHI0YuyqC8guTl:iiH8hCoit4Cxo5EmHWqC8n
Malware Config
Extracted
remcos
EXPLORER WDs
198.23.207.34:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-563ZPZ
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
PingPongWD
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
vjw0rm
http://129.204.138.203:7974
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 8 784 WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 1356 Dropperremvom.exe 1016 68.144.191remcos_nostartdisabler.exe 1400 axkjridon.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk axkjridon.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk axkjridon.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rfil.js WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rfil.js WScript.exe -
Loads dropped DLL 8 IoCs
pid Process 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 1356 Dropperremvom.exe 1356 Dropperremvom.exe 1740 WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "0\\10_68\\axkjridon.exe 0\\10_68\\oshcddl.okk" axkjridon.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce axkjridon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\10_68 = "0\\10_68\\start.vbs" axkjridon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run axkjridon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1260 reg.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe 1400 axkjridon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1356 Dropperremvom.exe 1016 68.144.191remcos_nostartdisabler.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1356 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 27 PID 1800 wrote to memory of 1356 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 27 PID 1800 wrote to memory of 1356 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 27 PID 1800 wrote to memory of 1356 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 27 PID 1800 wrote to memory of 1740 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 28 PID 1800 wrote to memory of 1740 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 28 PID 1800 wrote to memory of 1740 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 28 PID 1800 wrote to memory of 1740 1800 e891b42605aed838a3c8e5be6e5bf491.com.exe 28 PID 1356 wrote to memory of 1016 1356 Dropperremvom.exe 29 PID 1356 wrote to memory of 1016 1356 Dropperremvom.exe 29 PID 1356 wrote to memory of 1016 1356 Dropperremvom.exe 29 PID 1356 wrote to memory of 1016 1356 Dropperremvom.exe 29 PID 1356 wrote to memory of 784 1356 Dropperremvom.exe 30 PID 1356 wrote to memory of 784 1356 Dropperremvom.exe 30 PID 1356 wrote to memory of 784 1356 Dropperremvom.exe 30 PID 1356 wrote to memory of 784 1356 Dropperremvom.exe 30 PID 1016 wrote to memory of 584 1016 68.144.191remcos_nostartdisabler.exe 31 PID 1016 wrote to memory of 584 1016 68.144.191remcos_nostartdisabler.exe 31 PID 1016 wrote to memory of 584 1016 68.144.191remcos_nostartdisabler.exe 31 PID 1016 wrote to memory of 584 1016 68.144.191remcos_nostartdisabler.exe 31 PID 584 wrote to memory of 1260 584 cmd.exe 33 PID 584 wrote to memory of 1260 584 cmd.exe 33 PID 584 wrote to memory of 1260 584 cmd.exe 33 PID 584 wrote to memory of 1260 584 cmd.exe 33 PID 1740 wrote to memory of 1400 1740 WScript.exe 37 PID 1740 wrote to memory of 1400 1740 WScript.exe 37 PID 1740 wrote to memory of 1400 1740 WScript.exe 37 PID 1740 wrote to memory of 1400 1740 WScript.exe 37 PID 1400 wrote to memory of 956 1400 axkjridon.exe 39 PID 1400 wrote to memory of 956 1400 axkjridon.exe 39 PID 1400 wrote to memory of 956 1400 axkjridon.exe 39 PID 1400 wrote to memory of 956 1400 axkjridon.exe 39 PID 1400 wrote to memory of 672 1400 axkjridon.exe 40 PID 1400 wrote to memory of 672 1400 axkjridon.exe 40 PID 1400 wrote to memory of 672 1400 axkjridon.exe 40 PID 1400 wrote to memory of 672 1400 axkjridon.exe 40 PID 1400 wrote to memory of 1576 1400 axkjridon.exe 41 PID 1400 wrote to memory of 1576 1400 axkjridon.exe 41 PID 1400 wrote to memory of 1576 1400 axkjridon.exe 41 PID 1400 wrote to memory of 1576 1400 axkjridon.exe 41 PID 1400 wrote to memory of 1172 1400 axkjridon.exe 42 PID 1400 wrote to memory of 1172 1400 axkjridon.exe 42 PID 1400 wrote to memory of 1172 1400 axkjridon.exe 42 PID 1400 wrote to memory of 1172 1400 axkjridon.exe 42 PID 1400 wrote to memory of 780 1400 axkjridon.exe 43 PID 1400 wrote to memory of 780 1400 axkjridon.exe 43 PID 1400 wrote to memory of 780 1400 axkjridon.exe 43 PID 1400 wrote to memory of 780 1400 axkjridon.exe 43 PID 1400 wrote to memory of 1564 1400 axkjridon.exe 44 PID 1400 wrote to memory of 1564 1400 axkjridon.exe 44 PID 1400 wrote to memory of 1564 1400 axkjridon.exe 44 PID 1400 wrote to memory of 1564 1400 axkjridon.exe 44 PID 1400 wrote to memory of 1424 1400 axkjridon.exe 45 PID 1400 wrote to memory of 1424 1400 axkjridon.exe 45 PID 1400 wrote to memory of 1424 1400 axkjridon.exe 45 PID 1400 wrote to memory of 1424 1400 axkjridon.exe 45 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46 PID 1400 wrote to memory of 824 1400 axkjridon.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e891b42605aed838a3c8e5be6e5bf491.com.exe"C:\Users\Admin\AppData\Local\Temp\e891b42605aed838a3c8e5be6e5bf491.com.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\temp\10_68\Dropperremvom.exe"C:\Users\Admin\AppData\Local\temp\10_68\Dropperremvom.exe" ... that Dmitri Smirnov (pictured) composed the Triple Concerto No.2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe"C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe" 03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:1260
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rfil.js" 03⤵
- Blocklisted process makes network request
- Drops startup file
PID:784
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\10_68\dwganrrebc.vbe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe"C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe" oshcddl.okk3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:956
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:672
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1576
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1172
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:780
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1564
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:824
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
1.0MB
MD5b153044cf36a027e19eb94b06003f09c
SHA19c5137654c78d249b318d7612a4d3dd2710c3aea
SHA256cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550
SHA512ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96
-
Filesize
1.0MB
MD5b153044cf36a027e19eb94b06003f09c
SHA19c5137654c78d249b318d7612a4d3dd2710c3aea
SHA256cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550
SHA512ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96
-
Filesize
148.0MB
MD589f8d30673e4bab942af08e876b55f6a
SHA1e4eb6c563e7f5943dd1f97f25aa1395c9d282c4d
SHA2562929db20100a5fdd379450408141be4002f9bd98b27f91236b1e8588c0a5eb21
SHA512b64d014325756188366713830a3788ffefe5b0f12dfb3077034ead6952f4863e42580b276b7b4ffb097ba780f21885b4bfe510488e9d162f9c8c64a8c848757d
-
Filesize
191KB
MD5543c15dd13ea7501882bc01ec38d0a88
SHA1364a6166e0f477fd059f30223d1cbd5ada888347
SHA25605d7daee9691503daf1ac45d2c66a3959e53eed8f5e855e7de27d386dc45696a
SHA5126feb1e0edba670e7addf9662062e38b22d6904b1bc21183269673b13df24d7fff2f75df72e166c1b8eb66d55e8ff3819993981949588d384cb944f654b1e21ac
-
Filesize
74KB
MD569f8df46f9700d923d0c306d9257c609
SHA15ff4af179f6ba1c2afc5ee1e498c5d485d5585fe
SHA256e9e2092a5b41ff93a68bd98541aa1cc0dc3de3457a42990cb9c73d00b43fb3ac
SHA512ba563be78df9854c783b270281f3996eba7aeaa235c23c7d88431e4d627a617272df20d9d5c52759e1a4ee9de1c9f43f48783ee803139a05649a65755178ef83
-
Filesize
469KB
MD5a1a3a833a1b5ee29692fac886b8c1922
SHA16c82c2d7ac2c340e184ac96bb3c115e72310fe93
SHA2569fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4
SHA51227088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090
-
Filesize
3KB
MD56c705c7ee0ce269b3e6eb770b797e808
SHA1e8c6540e4dbb6a464e1f0c2c59cab161f44a8705
SHA256dbd1b9421d8634cc2af6ae9c4fe72891bd3139527730185d2e28afe0447b4e2e
SHA5120999401d3218986eac63b8e449a572cdd5aec382fac11a6aa86b6a4035107b75343f6f005d506322c0a0e853c7566cf49078991d93cadfab1e80fad8ed1d93e2
-
Filesize
27KB
MD569c99f6b7d4c2d4ea665ab552e39447f
SHA1f018b0a94cd63b9f134aac4313ecb30843b0dc84
SHA256884f4b15c1bbcd236b485bebeb0523ff3158afbf66cc81c38394fdd5e89f09c2
SHA5129feb8ca4dcd2ea72e71422800c68b7a0d34026328215565addb8dba3a097a87dfa61b9aa701ebc331257696930d03b9e718a00ed45f354668d48ae1892939a3b
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
484KB
MD5a4c95311e65e2dea102ab354fd2ce363
SHA1dd6ff55b42fadd8dc8cf08ea7590341120f3b12d
SHA25640088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab
SHA512927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6
-
Filesize
1.0MB
MD5b153044cf36a027e19eb94b06003f09c
SHA19c5137654c78d249b318d7612a4d3dd2710c3aea
SHA256cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550
SHA512ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96
-
Filesize
469KB
MD5a1a3a833a1b5ee29692fac886b8c1922
SHA16c82c2d7ac2c340e184ac96bb3c115e72310fe93
SHA2569fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4
SHA51227088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090
-
Filesize
469KB
MD5a1a3a833a1b5ee29692fac886b8c1922
SHA16c82c2d7ac2c340e184ac96bb3c115e72310fe93
SHA2569fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4
SHA51227088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090