Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 02:05
Static task
static1
Behavioral task
behavioral1
Sample
ebus.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebus.exe
Resource
win10v2004-20220812-en
General
-
Target
ebus.exe
-
Size
4.9MB
-
MD5
d0dd9d507dae67286edb8c0b5a8fef91
-
SHA1
deff04026dc178bf6ab9eb922f1e775104da494d
-
SHA256
de739f74131f337f9b6f5f2597a325c62eae0f3a5cf333e77717a6cb1779303f
-
SHA512
fed4fc8df2e4abf3a0efb83e827ecb63c0c538989982fb7bf361e06cdd65261329a2cf11112dae6b83ecf7f85aa350324ac3f7a6502315323fe3336282f36faa
-
SSDEEP
24576:3x+YXYYYOXYXYYY5X4L/qo5v1WdfJFHzR1cbBrOTVzgXKf+nJSGZ27S:
Malware Config
Extracted
remcos
Graced
185.156.174.115:32763
127.0.0.1:32763
10.13.93.136:32763
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-LRK9GW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Edftgazvr = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rqzveskto\\Edftgazvr.exe\"" ebus.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 980 1348 ebus.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1348 ebus.exe Token: SeDebugPrivilege 240 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1348 wrote to memory of 240 1348 ebus.exe 26 PID 1348 wrote to memory of 240 1348 ebus.exe 26 PID 1348 wrote to memory of 240 1348 ebus.exe 26 PID 1348 wrote to memory of 240 1348 ebus.exe 26 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28 PID 1348 wrote to memory of 980 1348 ebus.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebus.exe"C:\Users\Admin\AppData\Local\Temp\ebus.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAzAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Users\Admin\AppData\Local\Temp\ebus.exeC:\Users\Admin\AppData\Local\Temp\ebus.exe2⤵PID:980
-