Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-03-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
9fe11f84460abd22cc955530ca89cf8c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9fe11f84460abd22cc955530ca89cf8c.exe
Resource
win10v2004-20230220-en
General
-
Target
9fe11f84460abd22cc955530ca89cf8c.exe
-
Size
1.2MB
-
MD5
9fe11f84460abd22cc955530ca89cf8c
-
SHA1
dac857c046614f4ebb015faac209d5c24bc39a3c
-
SHA256
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
-
SHA512
dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
SSDEEP
24576:v1Qwe3cOQaNZ0AyQVdySyswtL3A9ghr9ZdxkmGIfZLV6sjM4:vBchynSwh36gdFpwsj
Malware Config
Extracted
remcos
Mekino-RemoteHost
nadiac7806.hopto.org:2397
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
los.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-XBQXEL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
trn
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1532 los.exe 1972 los.exe -
Loads dropped DLL 2 IoCs
pid Process 1440 cmd.exe 1440 cmd.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9fe11f84460abd22cc955530ca89cf8c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" 9fe11f84460abd22cc955530ca89cf8c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 9fe11f84460abd22cc955530ca89cf8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" 9fe11f84460abd22cc955530ca89cf8c.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\ los.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ los.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1148 set thread context of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1532 set thread context of 1972 1532 los.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 los.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 1148 wrote to memory of 832 1148 9fe11f84460abd22cc955530ca89cf8c.exe 28 PID 832 wrote to memory of 560 832 9fe11f84460abd22cc955530ca89cf8c.exe 29 PID 832 wrote to memory of 560 832 9fe11f84460abd22cc955530ca89cf8c.exe 29 PID 832 wrote to memory of 560 832 9fe11f84460abd22cc955530ca89cf8c.exe 29 PID 832 wrote to memory of 560 832 9fe11f84460abd22cc955530ca89cf8c.exe 29 PID 560 wrote to memory of 1440 560 WScript.exe 30 PID 560 wrote to memory of 1440 560 WScript.exe 30 PID 560 wrote to memory of 1440 560 WScript.exe 30 PID 560 wrote to memory of 1440 560 WScript.exe 30 PID 1440 wrote to memory of 1532 1440 cmd.exe 32 PID 1440 wrote to memory of 1532 1440 cmd.exe 32 PID 1440 wrote to memory of 1532 1440 cmd.exe 32 PID 1440 wrote to memory of 1532 1440 cmd.exe 32 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33 PID 1532 wrote to memory of 1972 1532 los.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe11f84460abd22cc955530ca89cf8c.exe"C:\Users\Admin\AppData\Local\Temp\9fe11f84460abd22cc955530ca89cf8c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\9fe11f84460abd22cc955530ca89cf8c.exe"C:\Users\Admin\AppData\Local\Temp\9fe11f84460abd22cc955530ca89cf8c.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mhdmaqkepp.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\los.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\los.exeC:\Users\Admin\AppData\Roaming\los.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\los.exe"C:\Users\Admin\AppData\Roaming\los.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5cf758ec06c989323030d19d47fc4dd16
SHA13e9f66e79d7c8964e0446f76b163198384bebb24
SHA25665c976c1e229ea7bc352c40862a0b71208b0b6bbe94a74d2ecb14b1fb70fcd3f
SHA5127d4e37e7e8d73a554fff47cf1557cc6c89e816b567fac40019805ac67b11db6f2f635134a30f7dbac11b9733af2caec9e2137fa1e03d588e3adea64adbfa09ea
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95