Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
Project.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Project.exe
Resource
win10v2004-20220812-en
General
-
Target
Project.exe
-
Size
6KB
-
MD5
fee53d5cc458aee8004396f72525b6d8
-
SHA1
e5d5c9486a6a6a83b0cec5a3651fa3c5833725d3
-
SHA256
30cb761998f92285b0e6dde6889ce264699566d277dec217e78c61aff0f2feac
-
SHA512
638a5a7e165a26fc621ecf8daa4abe67392740b361604a8860fd14f8bd608f43a5ceeb2172c11185afe9b8330e886ace9fda3e77c8a9f7aab1902943499c5900
-
SSDEEP
96:VxUySpmBOip4Gp0hMIer/9aNlAN4w/9x3zNt:I9mhp4GjoNmN4wzh
Malware Config
Extracted
remcos
RemoteHost
37.139.128.4:52324
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Y28G2Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Project.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cvmbynswwbl = "\"C:\\Users\\Admin\\AppData\\Roaming\\Cymsb\\Cvmbynswwbl.exe\"" Project.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4800 set thread context of 4268 4800 Project.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 powershell.exe 1436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4800 Project.exe Token: SeDebugPrivilege 1436 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1436 4800 Project.exe 84 PID 4800 wrote to memory of 1436 4800 Project.exe 84 PID 4800 wrote to memory of 1436 4800 Project.exe 84 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90 PID 4800 wrote to memory of 4268 4800 Project.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Project.exe"C:\Users\Admin\AppData\Local\Temp\Project.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAxAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\Project.exeC:\Users\Admin\AppData\Local\Temp\Project.exe2⤵PID:4268
-