Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2023 13:08
Static task
static1
Behavioral task
behavioral1
Sample
TT Air Export COSCO.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TT Air Export COSCO.exe
Resource
win10v2004-20220812-en
General
-
Target
TT Air Export COSCO.exe
-
Size
1.1MB
-
MD5
23ce4c2eb85eea9a1871bf922978ade9
-
SHA1
8cfa86cdbcda76c59cea93839115f84b9b47ced0
-
SHA256
5ca676b334d8a3f4542877a696a7092b29dbdeddabcd70af2a80e5c8384a75b6
-
SHA512
de2475abf3ed3101f9b3d6c7fa37da02ee99f7a37fd239f2a6e87b7d67837d1a5f3c09d05750150e08a18a881322c8b719e8d03efd43885c991774707817172c
-
SSDEEP
12288:oX8lOqFSsZ40z3QjB2lr5fPx7Zh70WoQzV9hBoSFhAf1nAhglR:Q8ltFSQ3AB2zp7pcf1nAhglR
Malware Config
Extracted
remcos
13-Feb-2023
193.23.3.34:43672
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
goog.dat
-
keylog_flag
false
-
keylog_folder
Google
-
mouse_option
false
-
mutex
-201DO7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4384-132-0x0000000002440000-0x000000000246C000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
TT Air Export COSCO.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yissqluu = "C:\\Users\\Public\\Libraries\\uulqssiY.url" TT Air Export COSCO.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TT Air Export COSCO.exedescription pid process target process PID 4384 set thread context of 1328 4384 TT Air Export COSCO.exe TT Air Export COSCO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
TT Air Export COSCO.exepid process 1328 TT Air Export COSCO.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
TT Air Export COSCO.exedescription pid process target process PID 4384 wrote to memory of 1328 4384 TT Air Export COSCO.exe TT Air Export COSCO.exe PID 4384 wrote to memory of 1328 4384 TT Air Export COSCO.exe TT Air Export COSCO.exe PID 4384 wrote to memory of 1328 4384 TT Air Export COSCO.exe TT Air Export COSCO.exe PID 4384 wrote to memory of 1328 4384 TT Air Export COSCO.exe TT Air Export COSCO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT Air Export COSCO.exe"C:\Users\Admin\AppData\Local\Temp\TT Air Export COSCO.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\TT Air Export COSCO.exeC:\Users\Admin\AppData\Local\Temp\TT Air Export COSCO.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1328