Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 17:43
Static task
static1
Behavioral task
behavioral1
Sample
6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab.js
Resource
win10v2004-20221111-en
General
-
Target
6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab.js
-
Size
873KB
-
MD5
90a8d36688fde3d0e06e101388baf1e1
-
SHA1
f36ba8657a332a72996c5aee51d3af45a68bbcb5
-
SHA256
6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab
-
SHA512
492e5d2e7a3a05906b6a521f6e6c8dafb6c32fd6da2a4075d69429f1750053302e81e96d5e282cd7281b3f9d53586f104ee6afbc59398d2d7b918e97d693c0dd
-
SSDEEP
12288:nBi1CUqtHhlYWwP2r0dNB8wDzyNfQyp/Yx76SKFRtYFhAc/kdP1WgZwfraDCa:nBizUDOyid0p
Malware Config
Extracted
remcos
RemoteHost
45.139.105.174:3132
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Y0T2QT
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 6 472 wscript.exe 16 472 wscript.exe 26 472 wscript.exe 37 472 wscript.exe 48 472 wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 652 pwer.exe 756 remcos.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TwZstDnUOX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TwZstDnUOX.js wscript.exe -
Loads dropped DLL 2 IoCs
pid Process 528 cmd.exe 528 cmd.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" pwer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" pwer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ pwer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 756 set thread context of 1944 756 remcos.exe 39 PID 1944 set thread context of 2020 1944 iexplore.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 1960 reg.exe 364 reg.exe 1956 reg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 756 remcos.exe 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1400 wrote to memory of 472 1400 wscript.exe 28 PID 1400 wrote to memory of 472 1400 wscript.exe 28 PID 1400 wrote to memory of 472 1400 wscript.exe 28 PID 1400 wrote to memory of 652 1400 wscript.exe 29 PID 1400 wrote to memory of 652 1400 wscript.exe 29 PID 1400 wrote to memory of 652 1400 wscript.exe 29 PID 1400 wrote to memory of 652 1400 wscript.exe 29 PID 652 wrote to memory of 1800 652 pwer.exe 31 PID 652 wrote to memory of 1800 652 pwer.exe 31 PID 652 wrote to memory of 1800 652 pwer.exe 31 PID 652 wrote to memory of 1800 652 pwer.exe 31 PID 1800 wrote to memory of 1960 1800 cmd.exe 33 PID 1800 wrote to memory of 1960 1800 cmd.exe 33 PID 1800 wrote to memory of 1960 1800 cmd.exe 33 PID 1800 wrote to memory of 1960 1800 cmd.exe 33 PID 652 wrote to memory of 1680 652 pwer.exe 34 PID 652 wrote to memory of 1680 652 pwer.exe 34 PID 652 wrote to memory of 1680 652 pwer.exe 34 PID 652 wrote to memory of 1680 652 pwer.exe 34 PID 1680 wrote to memory of 528 1680 WScript.exe 35 PID 1680 wrote to memory of 528 1680 WScript.exe 35 PID 1680 wrote to memory of 528 1680 WScript.exe 35 PID 1680 wrote to memory of 528 1680 WScript.exe 35 PID 528 wrote to memory of 756 528 cmd.exe 37 PID 528 wrote to memory of 756 528 cmd.exe 37 PID 528 wrote to memory of 756 528 cmd.exe 37 PID 528 wrote to memory of 756 528 cmd.exe 37 PID 756 wrote to memory of 1116 756 remcos.exe 38 PID 756 wrote to memory of 1116 756 remcos.exe 38 PID 756 wrote to memory of 1116 756 remcos.exe 38 PID 756 wrote to memory of 1116 756 remcos.exe 38 PID 756 wrote to memory of 1944 756 remcos.exe 39 PID 756 wrote to memory of 1944 756 remcos.exe 39 PID 756 wrote to memory of 1944 756 remcos.exe 39 PID 756 wrote to memory of 1944 756 remcos.exe 39 PID 756 wrote to memory of 1944 756 remcos.exe 39 PID 1944 wrote to memory of 1404 1944 iexplore.exe 41 PID 1944 wrote to memory of 1404 1944 iexplore.exe 41 PID 1944 wrote to memory of 1404 1944 iexplore.exe 41 PID 1944 wrote to memory of 1404 1944 iexplore.exe 41 PID 1116 wrote to memory of 364 1116 cmd.exe 43 PID 1116 wrote to memory of 364 1116 cmd.exe 43 PID 1116 wrote to memory of 364 1116 cmd.exe 43 PID 1116 wrote to memory of 364 1116 cmd.exe 43 PID 1944 wrote to memory of 2020 1944 iexplore.exe 44 PID 1944 wrote to memory of 2020 1944 iexplore.exe 44 PID 1944 wrote to memory of 2020 1944 iexplore.exe 44 PID 1944 wrote to memory of 2020 1944 iexplore.exe 44 PID 1944 wrote to memory of 2020 1944 iexplore.exe 44 PID 1404 wrote to memory of 1956 1404 cmd.exe 45 PID 1404 wrote to memory of 1956 1404 cmd.exe 45 PID 1404 wrote to memory of 1956 1404 cmd.exe 45 PID 1404 wrote to memory of 1956 1404 cmd.exe 45
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab.js1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\TwZstDnUOX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:472
-
-
C:\Users\Admin\AppData\Roaming\pwer.exe"C:\Users\Admin\AppData\Roaming\pwer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:1960
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\prvscfzraomgxcalaibdqswi.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- Modifies registry key
PID:364
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- Modifies registry key
PID:1956
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:2020
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
386B
MD51ec6289c6fd4c2ded6b2836ed28cbeb5
SHA1c4e08195e6c640eb8860acc03fda1d649b4fe070
SHA2566efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2
SHA51220bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288
-
Filesize
10KB
MD52e3decd57f43555d3d49623771f470f5
SHA1ed2341ea6a3cfcbd2741404a13a22faded1920ba
SHA256dcdbd17e3f9939f07f9438dc1cb6dab0ef36710553af33d3d09f2f27d58aaae3
SHA512708510e75684765d59774ea3c964b2b970411f0b865adcd953bb1a9777d666b8909dd268c26a85b6e732d0246ae1173b79572ee19cf894df6e04cf7afbb81c83
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81