Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 12:17
Static task
static1
Behavioral task
behavioral1
Sample
Remcos 1.7 Full version Cracked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Remcos 1.7 Full version Cracked.exe
Resource
win10v2004-20220812-en
General
-
Target
Remcos 1.7 Full version Cracked.exe
-
Size
13.2MB
-
MD5
c00c09e7fa52bc19bd425d71e78ff4cb
-
SHA1
2cd1a7130a03d4056454733b62e4667a08451262
-
SHA256
9bb347dce075e62a7df2121b6f413769b564e0b58d4302a2372bedeac6a2880b
-
SHA512
8d18238fe7c906ddd155b8af3a0d32604aeafaf352ab1947a07f273168740c5971083b157c7e21b74125a7e42d8684db5daba2cb3bc4971ca92f20949828a9d5
-
SSDEEP
49152:LLxWP/6L37yMNw9R9ZG2ca1ZHk5lPkSMc/iZCFlM/B74CEpTQozIENbVQDVdI+0V:9
Malware Config
Extracted
njrat
v2.0
System
2.tcp.ngrok.io:13817
Windows
-
reg_key
Windows
-
splitter
|-F-|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
paylod.exeremcos.exeSystem.exepid process 1976 paylod.exe 2272 remcos.exe 3584 System.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Remcos 1.7 Full version Cracked.exepaylod.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Remcos 1.7 Full version Cracked.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation paylod.exe -
Drops startup file 2 IoCs
Processes:
System.exepaylod.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk paylod.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
paylod.exeSystem.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\ProgramData\\System.exe" paylod.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
remcos.exepid process 2272 remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
remcos.exepid process 2272 remcos.exe 2272 remcos.exe 2272 remcos.exe 2272 remcos.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
System.exedescription pid process Token: SeDebugPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe Token: 33 3584 System.exe Token: SeIncBasePriorityPrivilege 3584 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 2272 remcos.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Remcos 1.7 Full version Cracked.exepaylod.exedescription pid process target process PID 2976 wrote to memory of 1976 2976 Remcos 1.7 Full version Cracked.exe paylod.exe PID 2976 wrote to memory of 1976 2976 Remcos 1.7 Full version Cracked.exe paylod.exe PID 2976 wrote to memory of 1976 2976 Remcos 1.7 Full version Cracked.exe paylod.exe PID 2976 wrote to memory of 2272 2976 Remcos 1.7 Full version Cracked.exe remcos.exe PID 2976 wrote to memory of 2272 2976 Remcos 1.7 Full version Cracked.exe remcos.exe PID 2976 wrote to memory of 2272 2976 Remcos 1.7 Full version Cracked.exe remcos.exe PID 1976 wrote to memory of 3584 1976 paylod.exe System.exe PID 1976 wrote to memory of 3584 1976 paylod.exe System.exe PID 1976 wrote to memory of 3584 1976 paylod.exe System.exe PID 1976 wrote to memory of 3604 1976 paylod.exe attrib.exe PID 1976 wrote to memory of 3604 1976 paylod.exe attrib.exe PID 1976 wrote to memory of 3604 1976 paylod.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remcos 1.7 Full version Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Remcos 1.7 Full version Cracked.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\paylod.exe"C:\Users\Admin\AppData\Local\Temp\paylod.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\ProgramData\System.exe"3⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\remcos.exe"C:\Users\Admin\AppData\Local\Temp\remcos.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\System.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\ProgramData\System.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\paylod.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\paylod.exeFilesize
26KB
MD524bf1ae1d62be5e1283fc4ddc9110dd9
SHA17b60b080982e77eb4565dce877236297280fcf36
SHA25655cc06f563e305e118f8d9d6307e88de5f802cd36f6bdf394e17b95bf852bd69
SHA512b0b1228c90ac6f795c3ee641c94045023cfc8fea0dba82c37c382cc91376c3b03ca0900c82881d9c8d99363a4fdeca4e8bc758c47730444195d0c52703bef391
-
C:\Users\Admin\AppData\Local\Temp\remcos.exeFilesize
9.9MB
MD5ed1e424ea6f625968a334377e8ac629f
SHA1ad00cc58a59a3d5b78d6603a1d09378e5dbd1647
SHA2561e5375b400f68c422804703390489b2cf3968c2a8bccb0b5b3c55fe1d2e3c991
SHA5125119b6ac8c1becda5b59a4802fc96828d338ba2d2767e5521bc226bf04b6637c1925b0cc1b0cf560540b1399730f695c55de23665e59d0683eb07d32939b8094
-
C:\Users\Admin\AppData\Local\Temp\remcos.exeFilesize
9.9MB
MD5ed1e424ea6f625968a334377e8ac629f
SHA1ad00cc58a59a3d5b78d6603a1d09378e5dbd1647
SHA2561e5375b400f68c422804703390489b2cf3968c2a8bccb0b5b3c55fe1d2e3c991
SHA5125119b6ac8c1becda5b59a4802fc96828d338ba2d2767e5521bc226bf04b6637c1925b0cc1b0cf560540b1399730f695c55de23665e59d0683eb07d32939b8094
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnkFilesize
1KB
MD5c87a0c01932e2b874bc3b392253a663a
SHA151422af62636aaaedfccbe8e4f49ffc027a90989
SHA2568a2b0b8a4e2bd3a1d8bad6ccd1dd2b92561b9abb7156b6701a6190458507795c
SHA512ffd135cebd6e00bb32e0fba5361554e617af27556022ab3cb04c43eae8121ebd17d3868bef382061d7cbc993e805e1501bd580bdcead8f77b44f8889ac14c0a8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnkFilesize
1KB
MD5586210e5f1de944d08dd141fcadd408a
SHA10b539a283bfe6c23839a5c44f668af3ae205288d
SHA25690a7d4cf6b4f075b45da710cf2f1fdfa71d0a654beb240fb74ff968ead06f742
SHA5124a2ffa2d32f1bbcbfb1d0d76509717b9088ccb99557e47b03b03277524d4f1c6bc419dd91537ffd7e8fee7e427c017de3bec88c80c21c326388efe45c3dccca6
-
memory/1976-133-0x0000000000000000-mapping.dmp
-
memory/1976-139-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/1976-149-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/2272-143-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/2272-144-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/2272-141-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/2272-136-0x0000000000000000-mapping.dmp
-
memory/2272-153-0x0000000000400000-0x0000000001ABE000-memory.dmpFilesize
22.7MB
-
memory/2976-132-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/2976-138-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/3584-145-0x0000000000000000-mapping.dmp
-
memory/3584-152-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/3584-154-0x0000000074640000-0x0000000074BF1000-memory.dmpFilesize
5.7MB
-
memory/3604-148-0x0000000000000000-mapping.dmp