Analysis
-
max time kernel
141s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
UUS.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
UUS.exe
Resource
win10v2004-20220812-en
General
-
Target
UUS.exe
-
Size
1.1MB
-
MD5
a3cc5b79c80fdc265d97ea7c73ae8017
-
SHA1
b9514255b5aebb6b07a133a0f70124c9a456ade0
-
SHA256
eadcb694c90b03001c2f276e59f56167138a77726f18e422ae942b8a518ca8c2
-
SHA512
b83b71b05075ae581330e1113fc6bfba325cb1147f560bb97b4d0317d9a646f5c495222545a56d96d8e3255eab84e09d9d70e632a2951bd82fb14c47dca16730
-
SSDEEP
24576:/ekPPpLnSJQwtTdFoBKvq4wL404YIE1Zu7/s8b/dROp6HlzF:DhneQwTFykqfL4wIE1U7JSEHlzF
Malware Config
Extracted
remcos
UD-Host
amegroupofschoos32.sytes.net:4820
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
dos.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
Rmc-7F587C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ax
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1012 dos.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 cmd.exe 1872 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ UUS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ax = "\"C:\\Users\\Admin\\AppData\\Roaming\\dos.exe\"" UUS.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ UUS.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ax = "\"C:\\Users\\Admin\\AppData\\Roaming\\dos.exe\"" UUS.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1112 set thread context of 856 1112 UUS.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 1112 wrote to memory of 856 1112 UUS.exe 26 PID 856 wrote to memory of 1264 856 UUS.exe 27 PID 856 wrote to memory of 1264 856 UUS.exe 27 PID 856 wrote to memory of 1264 856 UUS.exe 27 PID 856 wrote to memory of 1264 856 UUS.exe 27 PID 1264 wrote to memory of 1872 1264 WScript.exe 28 PID 1264 wrote to memory of 1872 1264 WScript.exe 28 PID 1264 wrote to memory of 1872 1264 WScript.exe 28 PID 1264 wrote to memory of 1872 1264 WScript.exe 28 PID 1872 wrote to memory of 1012 1872 cmd.exe 30 PID 1872 wrote to memory of 1012 1872 cmd.exe 30 PID 1872 wrote to memory of 1012 1872 cmd.exe 30 PID 1872 wrote to memory of 1012 1872 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\UUS.exe"C:\Users\Admin\AppData\Local\Temp\UUS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\UUS.exe"C:\Users\Admin\AppData\Local\Temp\UUS.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\dos.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\dos.exeC:\Users\Admin\AppData\Roaming\dos.exe5⤵
- Executes dropped EXE
PID:1012
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5900bef8cebe89717a150a46ada498865
SHA1f56e326209561a9baffeae921deefad15bb7a699
SHA25665be12a911de0a8ca2019e4bc52118fc2521b257aafae055bf6b1dff9247fa5c
SHA512eccf6ddd112f2219d52ef1feb70cab487d7d88bf8ca8637ca2f2cb5121da781dc9268bda45617191c1624957cd5df0b6b086e01fe868a325cac48f2e5f284e11
-
Filesize
1.1MB
MD5a3cc5b79c80fdc265d97ea7c73ae8017
SHA1b9514255b5aebb6b07a133a0f70124c9a456ade0
SHA256eadcb694c90b03001c2f276e59f56167138a77726f18e422ae942b8a518ca8c2
SHA512b83b71b05075ae581330e1113fc6bfba325cb1147f560bb97b4d0317d9a646f5c495222545a56d96d8e3255eab84e09d9d70e632a2951bd82fb14c47dca16730
-
Filesize
1.1MB
MD5a3cc5b79c80fdc265d97ea7c73ae8017
SHA1b9514255b5aebb6b07a133a0f70124c9a456ade0
SHA256eadcb694c90b03001c2f276e59f56167138a77726f18e422ae942b8a518ca8c2
SHA512b83b71b05075ae581330e1113fc6bfba325cb1147f560bb97b4d0317d9a646f5c495222545a56d96d8e3255eab84e09d9d70e632a2951bd82fb14c47dca16730
-
Filesize
1.1MB
MD5a3cc5b79c80fdc265d97ea7c73ae8017
SHA1b9514255b5aebb6b07a133a0f70124c9a456ade0
SHA256eadcb694c90b03001c2f276e59f56167138a77726f18e422ae942b8a518ca8c2
SHA512b83b71b05075ae581330e1113fc6bfba325cb1147f560bb97b4d0317d9a646f5c495222545a56d96d8e3255eab84e09d9d70e632a2951bd82fb14c47dca16730
-
Filesize
1.1MB
MD5a3cc5b79c80fdc265d97ea7c73ae8017
SHA1b9514255b5aebb6b07a133a0f70124c9a456ade0
SHA256eadcb694c90b03001c2f276e59f56167138a77726f18e422ae942b8a518ca8c2
SHA512b83b71b05075ae581330e1113fc6bfba325cb1147f560bb97b4d0317d9a646f5c495222545a56d96d8e3255eab84e09d9d70e632a2951bd82fb14c47dca16730