Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 15:53
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.PDF.exe
Resource
win10v2004-20230220-en
General
-
Target
hesaphareketi-01.PDF.exe
-
Size
500KB
-
MD5
826532ae78986d3b52639e72b1ac0e01
-
SHA1
bf5d6199c99e22e947595687af9b89954e2a6e37
-
SHA256
31e81d4201fec97127d8f8deffb64c25a76825d6c68fab083775e7197baa0956
-
SHA512
a1c8899bc1edd4587571130ea382b93adaa0bcc02f92a122a7e60343cc70aaf119a5d9c3a47baa5ae526dd12b69c451de42781ddd894876a80ca22b505f9397b
-
SSDEEP
12288:JYkYar2AbX18zFRBXKz6u1pSpGLyfeXLl3UU70:JYkYYi5K6u1pmEkeXLhA
Malware Config
Extracted
remcos
RemoteHost
ennenbach.duckdns.org:5800
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LDLQM0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
noptbru.exenoptbru.exepid process 876 noptbru.exe 436 noptbru.exe -
Loads dropped DLL 3 IoCs
Processes:
hesaphareketi-01.PDF.exenoptbru.exepid process 2008 hesaphareketi-01.PDF.exe 2008 hesaphareketi-01.PDF.exe 876 noptbru.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
noptbru.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\dmirn = "C:\\Users\\Admin\\AppData\\Roaming\\pienwscxhq\\mvfbkfoxt.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\noptbru.exe\" C:\\Users\\Admin\\AppData\\Loc" noptbru.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
noptbru.exenoptbru.exedescription pid process target process PID 876 set thread context of 436 876 noptbru.exe noptbru.exe PID 436 set thread context of 1780 436 noptbru.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 816 1780 WerFault.exe svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
noptbru.exenoptbru.exepid process 876 noptbru.exe 436 noptbru.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
noptbru.exepid process 436 noptbru.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
hesaphareketi-01.PDF.exenoptbru.exenoptbru.exesvchost.exedescription pid process target process PID 2008 wrote to memory of 876 2008 hesaphareketi-01.PDF.exe noptbru.exe PID 2008 wrote to memory of 876 2008 hesaphareketi-01.PDF.exe noptbru.exe PID 2008 wrote to memory of 876 2008 hesaphareketi-01.PDF.exe noptbru.exe PID 2008 wrote to memory of 876 2008 hesaphareketi-01.PDF.exe noptbru.exe PID 876 wrote to memory of 436 876 noptbru.exe noptbru.exe PID 876 wrote to memory of 436 876 noptbru.exe noptbru.exe PID 876 wrote to memory of 436 876 noptbru.exe noptbru.exe PID 876 wrote to memory of 436 876 noptbru.exe noptbru.exe PID 876 wrote to memory of 436 876 noptbru.exe noptbru.exe PID 436 wrote to memory of 1780 436 noptbru.exe svchost.exe PID 436 wrote to memory of 1780 436 noptbru.exe svchost.exe PID 436 wrote to memory of 1780 436 noptbru.exe svchost.exe PID 436 wrote to memory of 1780 436 noptbru.exe svchost.exe PID 436 wrote to memory of 1780 436 noptbru.exe svchost.exe PID 1780 wrote to memory of 816 1780 svchost.exe WerFault.exe PID 1780 wrote to memory of 816 1780 svchost.exe WerFault.exe PID 1780 wrote to memory of 816 1780 svchost.exe WerFault.exe PID 1780 wrote to memory of 816 1780 svchost.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.PDF.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\noptbru.exe"C:\Users\Admin\AppData\Local\Temp\noptbru.exe" C:\Users\Admin\AppData\Local\Temp\xzylabr.dxy2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\noptbru.exe"C:\Users\Admin\AppData\Local\Temp\noptbru.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2285⤵
- Program crash
PID:816
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180B
MD5089f11c888fc8c3b6289e3628de3676e
SHA1762695cad0330e88b16c7ebd30adc1d90dd40817
SHA2560901ef2a4c821342bd3dc026b73ba8c3f2b77ae5e27fae2f75f9ac1520c90d17
SHA512f0ad66b4a173be9b74ecbda5a5fe3cfef10c8ffa8c01e5ce1e0e51c1ab2e8554cd94cc2aedbca965342abec3365f8d42b2a457831526700b8c3f31292c92fa96
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
496KB
MD5eb65ab25be5e6ae467114cf52af2c960
SHA177966fcf2e5b5a614cbe3e43df55ea7c4a99b326
SHA2562d429d11f4fa136c4fa31759f1130ef91a83703edcd296ac4c55267c4152f4e6
SHA512da49e6bd7a576f550c5bc2d34ac171e964b018e0a0514d0a3e16ed4b9de29d4a428c75307944efd66f6be5d3bce7bfcd2d291103ed3905e5a295bc204d9164c9
-
Filesize
8KB
MD514c7f8b84044e72cc164b943ccc80e5c
SHA1de3c33dec85795fc1abcbb9860f22049cc22d724
SHA25650310fd5f742199d40cd603841348b1753660ab807afcc1d9fd0ce91d593700e
SHA512d9fd743b9c27194cb92410d15ee731d4cc3af999c1b55878cf58fa9b6d44fe106ed82f29391b9428975084d7f4d12611b6138d0d26f56dd17765b8cdb256c504
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799
-
Filesize
54KB
MD58722b30e6dffb45747d50c30bf1b1a59
SHA14dd89ebac1289cd3d0e671110bc2fb74cc5a2aef
SHA25628e506deca0f0f097219fc6ffe5173e5c621472d4d87ddf65beddde29c16c71f
SHA51223bf0b65874b0a73464d131d03dc1d3bdf5aea2fb10f5d0c363343178434b58add950ef0a49bc0518ba880800014d4959d8cd02cec2c26ae109515aab1393799