Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 10:30
Static task
static1
Behavioral task
behavioral1
Sample
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
Resource
win10v2004-20230220-en
General
-
Target
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe
-
Size
1.2MB
-
MD5
9fe11f84460abd22cc955530ca89cf8c
-
SHA1
dac857c046614f4ebb015faac209d5c24bc39a3c
-
SHA256
d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
-
SHA512
dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
SSDEEP
24576:v1Qwe3cOQaNZ0AyQVdySyswtL3A9ghr9ZdxkmGIfZLV6sjM4:vBchynSwh36gdFpwsj
Malware Config
Extracted
remcos
Mekino-RemoteHost
nadiac7806.hopto.org:2397
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
los.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Rmc-XBQXEL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
trn
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 5116 los.exe 4448 los.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ los.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" los.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\trn = "\"C:\\Users\\Admin\\AppData\\Roaming\\los.exe\"" d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run\ los.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4192 set thread context of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 5116 set thread context of 4448 5116 los.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4448 los.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 4192 wrote to memory of 1768 4192 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 86 PID 1768 wrote to memory of 1080 1768 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 87 PID 1768 wrote to memory of 1080 1768 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 87 PID 1768 wrote to memory of 1080 1768 d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe 87 PID 1080 wrote to memory of 4176 1080 WScript.exe 88 PID 1080 wrote to memory of 4176 1080 WScript.exe 88 PID 1080 wrote to memory of 4176 1080 WScript.exe 88 PID 4176 wrote to memory of 5116 4176 cmd.exe 90 PID 4176 wrote to memory of 5116 4176 cmd.exe 90 PID 4176 wrote to memory of 5116 4176 cmd.exe 90 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100 PID 5116 wrote to memory of 4448 5116 los.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"C:\Users\Admin\AppData\Local\Temp\d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wtxyt.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\los.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Roaming\los.exeC:\Users\Admin\AppData\Roaming\los.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Roaming\los.exe"C:\Users\Admin\AppData\Roaming\los.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5cf758ec06c989323030d19d47fc4dd16
SHA13e9f66e79d7c8964e0446f76b163198384bebb24
SHA25665c976c1e229ea7bc352c40862a0b71208b0b6bbe94a74d2ecb14b1fb70fcd3f
SHA5127d4e37e7e8d73a554fff47cf1557cc6c89e816b567fac40019805ac67b11db6f2f635134a30f7dbac11b9733af2caec9e2137fa1e03d588e3adea64adbfa09ea
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95
-
Filesize
1.2MB
MD59fe11f84460abd22cc955530ca89cf8c
SHA1dac857c046614f4ebb015faac209d5c24bc39a3c
SHA256d413604ffcd2897d729fd0079881b7b4a0dbd3d9d5869a97d7ec76713a12739c
SHA512dca05d1a79bba70b863730b32a6d10715efefaab8832351013a2c42a49ad2b33e9006c0f761a141c6a701088042d4c1d9c23cd41a5f12e68dd1ebdd8a1795d95