Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
972KB
-
MD5
3d21e82b2ab2331133cbf0fe32c43f7a
-
SHA1
7bcd150f9e1377bb3439fac2d631a59c2bf06fac
-
SHA256
4d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
-
SHA512
6ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
SSDEEP
12288:jagh/PsZ1DX/VDJKqzbq+HyByFAchZgiHeRhWqK2N0xW8yhn4VTBRWhA84PT2kyD:jagh/PBUtjFxgUemxhyah7XTDTs
Malware Config
Extracted
remcos
Awele
gdyhjjdhbvxgsfe.gotdns.ch:2718
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
qoc.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-LLTFOH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
mix
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
qoc.exeqoc.exepid process 2612 qoc.exe 3212 qoc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
file.exeqoc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mix = "\"C:\\Users\\Admin\\AppData\\Roaming\\qoc.exe\"" file.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mix = "\"C:\\Users\\Admin\\AppData\\Roaming\\qoc.exe\"" qoc.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ file.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exeqoc.exedescription pid process target process PID 1348 set thread context of 1836 1348 file.exe file.exe PID 2612 set thread context of 3212 2612 qoc.exe qoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
file.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
qoc.exepid process 3212 qoc.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
file.exefile.exeWScript.execmd.exeqoc.exedescription pid process target process PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1348 wrote to memory of 1836 1348 file.exe file.exe PID 1836 wrote to memory of 3244 1836 file.exe WScript.exe PID 1836 wrote to memory of 3244 1836 file.exe WScript.exe PID 1836 wrote to memory of 3244 1836 file.exe WScript.exe PID 3244 wrote to memory of 3420 3244 WScript.exe cmd.exe PID 3244 wrote to memory of 3420 3244 WScript.exe cmd.exe PID 3244 wrote to memory of 3420 3244 WScript.exe cmd.exe PID 3420 wrote to memory of 2612 3420 cmd.exe qoc.exe PID 3420 wrote to memory of 2612 3420 cmd.exe qoc.exe PID 3420 wrote to memory of 2612 3420 cmd.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe PID 2612 wrote to memory of 3212 2612 qoc.exe qoc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\qoc.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Roaming\qoc.exeC:\Users\Admin\AppData\Roaming\qoc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\qoc.exe"C:\Users\Admin\AppData\Roaming\qoc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD59edf722c5b68fc5befaf057c2aad1ccb
SHA10b079fc86d4c859ecb3c1a1893b6ffae2eb1e2cb
SHA256bfdf30f700f36f615a0b3a9389bdaa2b3a334ece816e95a3090f7c41ec8efba6
SHA512ea4f1e5842c38f998f2050004f4af9ffedeb0bbd4e6cf9e29b037f9659d48dd17b477a2b0ab23c1b6f8b94c4355a17f6155965bada1b98fd12c2868ec7ea82fc
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529
-
Filesize
972KB
MD53d21e82b2ab2331133cbf0fe32c43f7a
SHA17bcd150f9e1377bb3439fac2d631a59c2bf06fac
SHA2564d87f600c35b4b795142195bbe75c8e1a80f3c587c0c5eea6afa20d2f6587861
SHA5126ada585028f73f0de860900275a384638a59648252842cbef60da2d9be63e2272cf7ae09914c2fafa5fc85809c3d7f59369d291b702211a44cdaa1b64c563529