Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
UBABALO GRACIFIED.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
UBABALO GRACIFIED.exe
Resource
win10v2004-20220901-en
General
-
Target
UBABALO GRACIFIED.exe
-
Size
2.2MB
-
MD5
447a97e33d36fd65f45fd780a2694097
-
SHA1
bec9baf1f773fccfedf6b7f4b2f68482d9921b07
-
SHA256
96c227a95417ea3bb0c39c952b0b0709f62a525340ea402e5b3af59beba3c6ef
-
SHA512
02a5f607906c909f38c22c9ede990695fe57fff987f547308a1a628684a4d3fff07103e4657b53c98ab67778807e880c6549cae8d937fe5eb37681f7cd8096e9
-
SSDEEP
24576:PT/blbMca5Dm5CJ0O0z7wdhS4H4sWS9g0F4LbyN1AQDEJa9oTojuOJoEhcTGvp1n:PTjlIca51SO0IddEWev3QQYfWo283
Malware Config
Extracted
remcos
mimi
185.206.225.51:18853
127.0.0.1:18853
10.16.225.165:18853
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-WLJ5ZE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UBABALO GRACIFIED.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation UBABALO GRACIFIED.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UBABALO GRACIFIED.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Udqeiyosur = "\"C:\\Users\\Admin\\AppData\\Roaming\\Styoqwwgo\\Udqeiyosur.exe\"" UBABALO GRACIFIED.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
UBABALO GRACIFIED.exedescription pid process target process PID 3704 set thread context of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4616 powershell.exe 4616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
UBABALO GRACIFIED.exepowershell.exedescription pid process Token: SeDebugPrivilege 3704 UBABALO GRACIFIED.exe Token: SeDebugPrivilege 4616 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
UBABALO GRACIFIED.exedescription pid process target process PID 3704 wrote to memory of 4616 3704 UBABALO GRACIFIED.exe powershell.exe PID 3704 wrote to memory of 4616 3704 UBABALO GRACIFIED.exe powershell.exe PID 3704 wrote to memory of 4616 3704 UBABALO GRACIFIED.exe powershell.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe PID 3704 wrote to memory of 4412 3704 UBABALO GRACIFIED.exe UBABALO GRACIFIED.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"C:\Users\Admin\AppData\Local\Temp\UBABALO GRACIFIED.exe"2⤵PID:4412