Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
972KB
-
MD5
3d21e82b2ab2331133cbf0fe32c43f7a
-
SHA1
7bcd150f9e1377bb3439fac2d631a59c2bf06fac
-
SHA256
4d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
-
SHA512
6ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
SSDEEP
12288:jagh/PsZ1DX/VDJKqzbq+HyByFAchZgiHeRhWqK2N0xW8yhn4VTBRWhA84PT2kyD:jagh/PBUtjFxgUemxhyah7XTDTs
Malware Config
Extracted
remcos
Awele
gdyhjjdhbvxgsfe.gotdns.ch:2718
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
qoc.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-LLTFOH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
mix
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
qoc.exeqoc.exepid process 316 qoc.exe 1812 qoc.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1808 cmd.exe 1808 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
file.exeqoc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ file.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\mix = "\"C:\\Users\\Admin\\AppData\\Roaming\\qoc.exe\"" file.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\mix = "\"C:\\Users\\Admin\\AppData\\Roaming\\qoc.exe\"" qoc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exeqoc.exedescription pid process target process PID 1320 set thread context of 580 1320 file.exe file.exe PID 316 set thread context of 1812 316 qoc.exe qoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
qoc.exepid process 1812 qoc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
file.exefile.exeWScript.execmd.exeqoc.exedescription pid process target process PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 1320 wrote to memory of 580 1320 file.exe file.exe PID 580 wrote to memory of 828 580 file.exe WScript.exe PID 580 wrote to memory of 828 580 file.exe WScript.exe PID 580 wrote to memory of 828 580 file.exe WScript.exe PID 580 wrote to memory of 828 580 file.exe WScript.exe PID 828 wrote to memory of 1808 828 WScript.exe cmd.exe PID 828 wrote to memory of 1808 828 WScript.exe cmd.exe PID 828 wrote to memory of 1808 828 WScript.exe cmd.exe PID 828 wrote to memory of 1808 828 WScript.exe cmd.exe PID 1808 wrote to memory of 316 1808 cmd.exe qoc.exe PID 1808 wrote to memory of 316 1808 cmd.exe qoc.exe PID 1808 wrote to memory of 316 1808 cmd.exe qoc.exe PID 1808 wrote to memory of 316 1808 cmd.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe PID 316 wrote to memory of 1812 316 qoc.exe qoc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\qoc.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\qoc.exeC:\Users\Admin\AppData\Roaming\qoc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\qoc.exe"C:\Users\Admin\AppData\Roaming\qoc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD59edf722c5b68fc5befaf057c2aad1ccb
SHA10b079fc86d4c859ecb3c1a1893b6ffae2eb1e2cb
SHA256bfdf30f700f36f615a0b3a9389bdaa2b3a334ece816e95a3090f7c41ec8efba6
SHA512ea4f1e5842c38f998f2050004f4af9ffedeb0bbd4e6cf9e29b037f9659d48dd17b477a2b0ab23c1b6f8b94c4355a17f6155965bada1b98fd12c2868ec7ea82fc
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529