Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
Aaqaybpuu.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Aaqaybpuu.exe
Resource
win10v2004-20220812-en
General
-
Target
Aaqaybpuu.exe
-
Size
4.9MB
-
MD5
a06614c188d065ad72275761891c0f00
-
SHA1
dfe7e3037ea5ea699c6491988b09e207818a3793
-
SHA256
75f6fa2b6b27e284e274706113a51d756d313d7326cb515d77abf7617c4a8295
-
SHA512
c79445dbf40f71673cf5950450b6001ab51a43383d5dd3319343b5e45517d6ea46c4f61f361f3c560bc5851afbf2024dab248a90b22dba9f6abe29727946df06
-
SSDEEP
24576:8ahlMa/PkO7hTqcaIqZUFUMIzsqZXr46240TNdv3pPZmypz:
Malware Config
Extracted
remcos
2.7.1 Pro
RemoteHost
79.142.69.160:24103
127.0.0.1:24103
10.9.239.161:24103
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-RQ9NAF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Aaqaybpuu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xrhfmjp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qjovnqqka\\Xrhfmjp.exe\"" Aaqaybpuu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4664 set thread context of 2780 4664 Aaqaybpuu.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1132 powershell.exe 1132 powershell.exe 3444 powershell.exe 3444 powershell.exe 4664 Aaqaybpuu.exe 4664 Aaqaybpuu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4664 Aaqaybpuu.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 3444 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1132 4664 Aaqaybpuu.exe 81 PID 4664 wrote to memory of 1132 4664 Aaqaybpuu.exe 81 PID 4664 wrote to memory of 1132 4664 Aaqaybpuu.exe 81 PID 4664 wrote to memory of 1868 4664 Aaqaybpuu.exe 89 PID 4664 wrote to memory of 1868 4664 Aaqaybpuu.exe 89 PID 4664 wrote to memory of 1868 4664 Aaqaybpuu.exe 89 PID 1868 wrote to memory of 3444 1868 cmd.exe 91 PID 1868 wrote to memory of 3444 1868 cmd.exe 91 PID 1868 wrote to memory of 3444 1868 cmd.exe 91 PID 4664 wrote to memory of 2276 4664 Aaqaybpuu.exe 92 PID 4664 wrote to memory of 2276 4664 Aaqaybpuu.exe 92 PID 4664 wrote to memory of 2276 4664 Aaqaybpuu.exe 92 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93 PID 4664 wrote to memory of 2780 4664 Aaqaybpuu.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exe"C:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exeC:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exe2⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exeC:\Users\Admin\AppData\Local\Temp\Aaqaybpuu.exe2⤵PID:2780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD59f6d18a12a625e33d8575a4ff5324e83
SHA192bce377ecd0fb12ab3ed84c90048aac9a8744cc
SHA2567bb2322ed183d05117cc45a70831bde6c649746c4e7d9b1230eeba1311b4a7bf
SHA512be4a457ec29015526bb2e2b72809fe7e8d5e5fd17f1fce8283ec64d0ba2548682dc006bdf13cc0865c91f97fe867418fb215a79896b94626bf2758a63d2f766a