Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/01/2023, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe
Resource
win10v2004-20221111-en
General
-
Target
e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe
-
Size
1.1MB
-
MD5
d9b3775511c7538a73dfeaab0073b4b6
-
SHA1
e3a64adc43c5c5c0bfc725344407433b4b497fa9
-
SHA256
98479f2d5e3f5147ddd504bcc7bd1a2b0a3b06ff5525f313a55ce81efc67fc28
-
SHA512
6b685246032b7c4a09f4df63dbc1282dfdd9822911744d9b9bcb4b135139a7a25b7d0daf30fd0b62b254ede16d010dbd18e8a8adef384bcfa11400a4605e6969
-
SSDEEP
24576:QOwgbq09TF+lmP8iZ1P/wvDcm9puPYxsJ4gb:HrdDAvFYQsqgb
Malware Config
Extracted
remcos
RemoteHost
51.75.209.245:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CMFPLR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 1448 powershell.exe 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1620 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 28 PID 2040 wrote to memory of 1620 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 28 PID 2040 wrote to memory of 1620 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 28 PID 2040 wrote to memory of 1620 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 28 PID 2040 wrote to memory of 1448 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 30 PID 2040 wrote to memory of 1448 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 30 PID 2040 wrote to memory of 1448 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 30 PID 2040 wrote to memory of 1448 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 30 PID 2040 wrote to memory of 892 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 31 PID 2040 wrote to memory of 892 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 31 PID 2040 wrote to memory of 892 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 31 PID 2040 wrote to memory of 892 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 31 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34 PID 2040 wrote to memory of 1796 2040 e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe"C:\Users\Admin\AppData\Local\Temp\e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\oCfQiTZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oCfQiTZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC0A2.tmp"2⤵
- Creates scheduled task(s)
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe"C:\Users\Admin\AppData\Local\Temp\e3a64adc43c5c5c0bfc725344407433b4b497fa9.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509ed65df7f73598b7a1d81f8330f2eb9
SHA157f33d4e5d69d77326877cbc3db15bfe4e0fc72f
SHA256df4d1bcaa3f33dec04bef92b7ea652dbdaad7e087cff1a827495635c75418fb3
SHA512401ec25877fa0df4b6a9cbd90b6e80875be91cdb568dad79bba6153ca2ff6aeddea6b6937ea09970b560e8b8c39a7897a8cd145f68a70f5df60cb4671b38ebba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b6da0b66dd635ed7974140965aa8dff2
SHA1ac246c64ce4a444c204f4952cbd882bdca3bbd54
SHA256b8028a2cdf5867ed8328b86e2e30ad748274b3d3bde19740ad5b33f17d8cbbdb
SHA51263eb668ff983b557dadf824d2d14279ea6e8de9e0aa439a99337fb258d3b26ce7077a65b153461b44bc3f5413ee4e871496d46fd1a74e0cfa14b1f2427a7b057