Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 06:08
Static task
static1
Behavioral task
behavioral1
Sample
on demand.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
on demand.exe
Resource
win10v2004-20230220-en
General
-
Target
on demand.exe
-
Size
541KB
-
MD5
a6ef3293f66f1f2d3ae7a368b60dc577
-
SHA1
af2f768b813b8a05908ab2040551728427a7078a
-
SHA256
cf9bbb8ecfcffe72f03f134197a9e6e58c405b6f0eba941bf079899d4411c5db
-
SHA512
a0c03dc2f552c51552c8dfcb54b46757aeb0efc5160e1c82f91951c8e1ef3106b2609129f01eaab0cbf3eedbb350afde693749c14b38c1877df75b3deea5dd0d
-
SSDEEP
12288:KYTv1iDSrrW+gEYdOobbP/x6Gc6OFGXF4ifMyyqBgD+J:KYTv1iOgGWlKF/K7gD+J
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:55898
180.214.238.18:55898
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-08QBMU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
pghscxwgeb.exepghscxwgeb.exepid process 1208 pghscxwgeb.exe 1328 pghscxwgeb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
pghscxwgeb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irmvrbk = "C:\\Users\\Admin\\AppData\\Roaming\\yenirbwgcluqaj\\foktdy.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\pghscxwgeb.exe\" C:\\Users\\Admin\\AppData" pghscxwgeb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pghscxwgeb.exedescription pid process target process PID 1208 set thread context of 1328 1208 pghscxwgeb.exe pghscxwgeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
pghscxwgeb.exepid process 1208 pghscxwgeb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
pghscxwgeb.exepid process 1328 pghscxwgeb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
on demand.exepghscxwgeb.exedescription pid process target process PID 4484 wrote to memory of 1208 4484 on demand.exe pghscxwgeb.exe PID 4484 wrote to memory of 1208 4484 on demand.exe pghscxwgeb.exe PID 4484 wrote to memory of 1208 4484 on demand.exe pghscxwgeb.exe PID 1208 wrote to memory of 1328 1208 pghscxwgeb.exe pghscxwgeb.exe PID 1208 wrote to memory of 1328 1208 pghscxwgeb.exe pghscxwgeb.exe PID 1208 wrote to memory of 1328 1208 pghscxwgeb.exe pghscxwgeb.exe PID 1208 wrote to memory of 1328 1208 pghscxwgeb.exe pghscxwgeb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\on demand.exe"C:\Users\Admin\AppData\Local\Temp\on demand.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exe"C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exe" C:\Users\Admin\AppData\Local\Temp\wvoxvopxjva.w2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exe"C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD521978df572df6df7edcca865a577241a
SHA175d139bf92e2caa45df54cadc26b4b9b98b2865d
SHA256d3f2b5a08193e3fcdb18ae3f03822d0d9472449c5695c1bb2bd8445c2a6596e4
SHA512a7b6166e221e2d68cee16b327bb10b62be3542806de45fed4e2eaeef5a40351b162e4352db1b3c58252708881c27b84bebf503d158006c1c630f68b9416fa9f7
-
C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exeFilesize
138KB
MD582334772e194ae5493a7dbb0659eaeda
SHA1c3fd675eeabce7da7440e5675105239693b2bee7
SHA2564dafd419d7527d71fa56c6c124b1da96ec108bd7685ff98e79d15ba122e04530
SHA512766d3e8cf88d635fb78ef33613ef8d2926cc1a113613df9bf3f639ec5db394657aabe53e5d1b2ead6aa6ebcc4c1da1803992fa13bf6271e3f9628d6aadb228ed
-
C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exeFilesize
138KB
MD582334772e194ae5493a7dbb0659eaeda
SHA1c3fd675eeabce7da7440e5675105239693b2bee7
SHA2564dafd419d7527d71fa56c6c124b1da96ec108bd7685ff98e79d15ba122e04530
SHA512766d3e8cf88d635fb78ef33613ef8d2926cc1a113613df9bf3f639ec5db394657aabe53e5d1b2ead6aa6ebcc4c1da1803992fa13bf6271e3f9628d6aadb228ed
-
C:\Users\Admin\AppData\Local\Temp\pghscxwgeb.exeFilesize
138KB
MD582334772e194ae5493a7dbb0659eaeda
SHA1c3fd675eeabce7da7440e5675105239693b2bee7
SHA2564dafd419d7527d71fa56c6c124b1da96ec108bd7685ff98e79d15ba122e04530
SHA512766d3e8cf88d635fb78ef33613ef8d2926cc1a113613df9bf3f639ec5db394657aabe53e5d1b2ead6aa6ebcc4c1da1803992fa13bf6271e3f9628d6aadb228ed
-
C:\Users\Admin\AppData\Local\Temp\wvoxvopxjva.wFilesize
7KB
MD51f908367955b6d2238e2d5640f05177e
SHA1b24c2f3c2dcdbbb8d5a74ea3db8349225f9ee926
SHA256b8cb0a382514f8598ece81d01ed770a182420fe92f0049fbf0285668d8eca0ef
SHA51288aa1bb3078471416cbbd511435896bcc064de414cdc7362d1f64070559f623c99597370d78503aff12f5da69113697a7a301471c14445bc76598c9a013532b7
-
C:\Users\Admin\AppData\Local\Temp\xpwswdvofjr.blaFilesize
496KB
MD554ecaf4f40b83a83f7667ab7016c7b5c
SHA1a3d877d72f7b8986d196a9ee09c01e7c4a8df453
SHA25658c07d62898690ecbb0ed26859c087ae7f22ee71f1973eaab4041a1a48754d82
SHA5129ee717cce17da6f754330f660c94fb9cf7bf614f6a1715046acd5d001b660dace0d827831eb37938d48ac0b9b7a36098b5905467b63b77f6dc96e21cf30a9a82
-
memory/1328-164-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-173-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-147-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-149-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-150-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-151-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-152-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-153-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-155-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-156-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-157-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-160-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-161-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-162-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-144-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-167-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-142-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-170-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-172-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-145-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-175-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-177-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-180-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-183-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-184-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-185-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-189-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-192-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-194-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-195-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-196-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-199-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-202-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-205-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-206-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-207-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1328-211-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB