Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2023, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
Resource
win10v2004-20230220-en
General
-
Target
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
-
Size
1.2MB
-
MD5
9fe11f84460abd22cc955530ca89cf8c
-
SHA1
dac857c046614f4ebb015faac209d5c24bc39a3c
-
SHA256
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
-
SHA512
dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
SSDEEP
24576:v1Qwe3cOQaNZ0AyQVdySyswtL3A9ghr9ZdxkmGIfZLV6sjM4:vBchynSwh36gdFpwsj
Malware Config
Extracted
remcos
Mekino-RemoteHost
nadiac7806.hopto.org:2397
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
los.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-XBQXEL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
trn
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1572 los.exe 1948 los.exe 1920 los.exe 1288 los.exe -
Loads dropped DLL 2 IoCs
pid Process 1108 cmd.exe 1108 cmd.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\ los.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ los.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1292 set thread context of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1572 set thread context of 1288 1572 los.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1572 los.exe 1572 los.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1572 los.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1288 los.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 1292 wrote to memory of 596 1292 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 27 PID 596 wrote to memory of 1600 596 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 28 PID 596 wrote to memory of 1600 596 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 28 PID 596 wrote to memory of 1600 596 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 28 PID 596 wrote to memory of 1600 596 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 28 PID 1600 wrote to memory of 1108 1600 WScript.exe 29 PID 1600 wrote to memory of 1108 1600 WScript.exe 29 PID 1600 wrote to memory of 1108 1600 WScript.exe 29 PID 1600 wrote to memory of 1108 1600 WScript.exe 29 PID 1108 wrote to memory of 1572 1108 cmd.exe 31 PID 1108 wrote to memory of 1572 1108 cmd.exe 31 PID 1108 wrote to memory of 1572 1108 cmd.exe 31 PID 1108 wrote to memory of 1572 1108 cmd.exe 31 PID 1572 wrote to memory of 1948 1572 los.exe 32 PID 1572 wrote to memory of 1948 1572 los.exe 32 PID 1572 wrote to memory of 1948 1572 los.exe 32 PID 1572 wrote to memory of 1948 1572 los.exe 32 PID 1572 wrote to memory of 1920 1572 los.exe 33 PID 1572 wrote to memory of 1920 1572 los.exe 33 PID 1572 wrote to memory of 1920 1572 los.exe 33 PID 1572 wrote to memory of 1920 1572 los.exe 33 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34 PID 1572 wrote to memory of 1288 1572 los.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\igxyhctgdhxwmigiweoooldzn.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\los.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\los.exeC:\Users\Admin\AppData\Roaming\los.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\los.exe"C:\Users\Admin\AppData\Roaming\los.exe"6⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\AppData\Roaming\los.exe"C:\Users\Admin\AppData\Roaming\los.exe"6⤵
- Executes dropped EXE
PID:1920
-
-
C:\Users\Admin\AppData\Roaming\los.exe"C:\Users\Admin\AppData\Roaming\los.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5cf758ec06c989323030d19d47fc4dd16
SHA13e9f66e79d7c8964e0446f76b163198384bebb24
SHA25665c976c1e229ea7bc352c40862a0b71208b0b6bbe94a74d2ecb14b1fb70fcd3f
SHA5127d4e37e7e8d73a554fff47cf1557cc6c89e816b567fac40019805ac67b11db6f2f635134a30f7dbac11b9733af2caec9e2137fa1e03d588e3adea64adbfa09ea
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95