Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15/01/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe
Resource
win10-20220812-en
General
-
Target
e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe
-
Size
1.0MB
-
MD5
d48f082a4ddfaffaffc718bbbe13daac
-
SHA1
0cdea96bfbbbddb879f35ced74620292c2cbf687
-
SHA256
e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0
-
SHA512
558cdc2c80a6d9789d0faece85d17c37171305af4324c0176b369cdf4bde6472c07547ece539493ba5c79c6d2d9ca3699aff97182fee4ffff71f0436e7376aba
-
SSDEEP
24576:xYTYWWpQP+WMKUwMqROO54Nhi3TJgyYjnwSIeOhmhBKRK:xYTY9pA/MKUzkLYjmMK
Malware Config
Extracted
remcos
1122023
nikahuve.ac.ug:65214
kalskala.ac.ug:65214
tuekisaa.ac.ug:65214
parthaha.ac.ug:65214
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
vgbvfxs.dat
-
keylog_flag
false
-
keylog_folder
fsscbas
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
fdsgsdmhj-9K01C1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wdzblwjl = "\"C:\\Users\\Admin\\AppData\\Roaming\\Amlcowp\\Wdzblwjl.exe\"" e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe Token: SeDebugPrivilege 672 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 320 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1484 wrote to memory of 284 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 27 PID 1484 wrote to memory of 284 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 27 PID 1484 wrote to memory of 284 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 27 PID 1484 wrote to memory of 284 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 27 PID 284 wrote to memory of 672 284 cmd.exe 29 PID 284 wrote to memory of 672 284 cmd.exe 29 PID 284 wrote to memory of 672 284 cmd.exe 29 PID 284 wrote to memory of 672 284 cmd.exe 29 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30 PID 1484 wrote to memory of 320 1484 e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe"C:\Users\Admin\AppData\Local\Temp\e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
-
C:\Users\Admin\AppData\Local\Temp\e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exeC:\Users\Admin\AppData\Local\Temp\e623fb7f8f26f1222cc777af5a585acbf9cc5e1f72f09aeae3dcee8c518864e0.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:320
-