Analysis
-
max time kernel
208s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 21:20
Static task
static1
General
-
Target
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe
-
Size
746KB
-
MD5
9140ccdcddf8331c3204be8d3eadeb33
-
SHA1
004fe0732d9065590386bbcc13b834d6bb39d07f
-
SHA256
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
-
SHA512
3a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
SSDEEP
12288:RqhmZJbxpDFJxbxmnq2Co4a5mJ2pKBaOtg4e/uKy8Kt58bLjKj3/4vjSC:RQixh3OFK0+e/u8KvynKj3/zC
Malware Config
Extracted
remcos
1.7 Pro
Nov 24th
gcrozona.duckdns.org:6062
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Microsoft Intel Audios.exe
-
copy_folder
Audio Microsoft File
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows Display
-
keylog_path
%WinDir%
-
mouse_option
false
-
mutex
Windows Audio
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Window Security Check
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
Username;password;proforma;invoice;notepad
Signatures
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
Processes:
Microsoft Intel Audios.exeMicrosoft Intel Audios.exepid process 4016 Microsoft Intel Audios.exe 1636 Microsoft Intel Audios.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exeMicrosoft Intel Audios.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window Security Check = "\"C:\\Windows\\Audio Microsoft File\\Microsoft Intel Audios.exe\"" 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Microsoft Intel Audios.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window Security Check = "\"C:\\Windows\\Audio Microsoft File\\Microsoft Intel Audios.exe\"" Microsoft Intel Audios.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exeMicrosoft Intel Audios.exedescription pid process target process PID 1104 set thread context of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 4016 set thread context of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe -
Drops file in Windows directory 5 IoCs
Processes:
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exeMicrosoft Intel Audios.exedescription ioc process File opened for modification C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe File opened for modification C:\Windows\Audio Microsoft File 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe File opened for modification C:\Windows\Windows Display\logs.dat Microsoft Intel Audios.exe File created C:\Windows\Windows Display\logs.dat Microsoft Intel Audios.exe File created C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Microsoft Intel Audios.exepid process 1636 Microsoft Intel Audios.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.execmd.execmd.exeMicrosoft Intel Audios.exeMicrosoft Intel Audios.execmd.exedescription pid process target process PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 1104 wrote to memory of 3012 1104 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe PID 3012 wrote to memory of 3888 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3012 wrote to memory of 3888 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3012 wrote to memory of 3888 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3888 wrote to memory of 2484 3888 cmd.exe reg.exe PID 3888 wrote to memory of 2484 3888 cmd.exe reg.exe PID 3888 wrote to memory of 2484 3888 cmd.exe reg.exe PID 3012 wrote to memory of 3868 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3012 wrote to memory of 3868 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3012 wrote to memory of 3868 3012 4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe cmd.exe PID 3868 wrote to memory of 1308 3868 cmd.exe PING.EXE PID 3868 wrote to memory of 1308 3868 cmd.exe PING.EXE PID 3868 wrote to memory of 1308 3868 cmd.exe PING.EXE PID 3868 wrote to memory of 4016 3868 cmd.exe Microsoft Intel Audios.exe PID 3868 wrote to memory of 4016 3868 cmd.exe Microsoft Intel Audios.exe PID 3868 wrote to memory of 4016 3868 cmd.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 4016 wrote to memory of 1636 4016 Microsoft Intel Audios.exe Microsoft Intel Audios.exe PID 1636 wrote to memory of 1728 1636 Microsoft Intel Audios.exe cmd.exe PID 1636 wrote to memory of 1728 1636 Microsoft Intel Audios.exe cmd.exe PID 1636 wrote to memory of 1728 1636 Microsoft Intel Audios.exe cmd.exe PID 1728 wrote to memory of 1516 1728 cmd.exe reg.exe PID 1728 wrote to memory of 1516 1728 cmd.exe reg.exe PID 1728 wrote to memory of 1516 1728 cmd.exe reg.exe PID 1636 wrote to memory of 1944 1636 Microsoft Intel Audios.exe iexplore.exe PID 1636 wrote to memory of 1944 1636 Microsoft Intel Audios.exe iexplore.exe PID 1636 wrote to memory of 1944 1636 Microsoft Intel Audios.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe"C:\Users\Admin\AppData\Local\Temp\4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe"C:\Users\Admin\AppData\Local\Temp\4cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
-
C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe"C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe"C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- Modifies registry key
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.batFilesize
109B
MD58ddcdd0ab01b0740982e7b78b1591015
SHA1acbb9c4bb32822a164f200f8b77eda0ce7bd758d
SHA2567c1abbf1a20f581d2db76d769cc14cf753a412cf92e383a36ffbf0c962eaf678
SHA512ef43e3cb89c800529530183d4315782a864281ef8a0e6443a54ccc4f1837fcbfe43027b399bb43ea114fab70416d49b3cb2539cf8bf658b4b447c4e8597959dc
-
C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exeFilesize
746KB
MD59140ccdcddf8331c3204be8d3eadeb33
SHA1004fe0732d9065590386bbcc13b834d6bb39d07f
SHA2564cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
SHA5123a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exeFilesize
746KB
MD59140ccdcddf8331c3204be8d3eadeb33
SHA1004fe0732d9065590386bbcc13b834d6bb39d07f
SHA2564cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
SHA5123a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
C:\Windows\Audio Microsoft File\Microsoft Intel Audios.exeFilesize
746KB
MD59140ccdcddf8331c3204be8d3eadeb33
SHA1004fe0732d9065590386bbcc13b834d6bb39d07f
SHA2564cbf921ca59d8725280de0d34864dc44eb98fadde5ea010683a8f8820eb3b803
SHA5123a6e7c2e36bc012029d31e3ec8305a10db64f3ebef2a6f38847d9f61776b8029cd03a64951263f7ec4d3cd7782b08c0dd440dd73554dc0e675f4f0d1ecbbc9a7
-
memory/1104-133-0x00000000053D0000-0x0000000005974000-memory.dmpFilesize
5.6MB
-
memory/1104-134-0x0000000004D00000-0x0000000004D92000-memory.dmpFilesize
584KB
-
memory/1104-135-0x0000000004CB0000-0x0000000004CBA000-memory.dmpFilesize
40KB
-
memory/1104-136-0x0000000008760000-0x00000000087FC000-memory.dmpFilesize
624KB
-
memory/1104-132-0x0000000000250000-0x0000000000312000-memory.dmpFilesize
776KB
-
memory/1308-147-0x0000000000000000-mapping.dmp
-
memory/1516-157-0x0000000000000000-mapping.dmp
-
memory/1636-151-0x0000000000000000-mapping.dmp
-
memory/1636-155-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1636-158-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1728-156-0x0000000000000000-mapping.dmp
-
memory/2484-143-0x0000000000000000-mapping.dmp
-
memory/3012-138-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3012-145-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3012-141-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3012-140-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3012-137-0x0000000000000000-mapping.dmp
-
memory/3868-144-0x0000000000000000-mapping.dmp
-
memory/3888-142-0x0000000000000000-mapping.dmp
-
memory/4016-148-0x0000000000000000-mapping.dmp