Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
1002KB
-
MD5
8adf9b40df999fad8e478c9872f1022f
-
SHA1
7a035a3b378422cdc19dac99b80cf3695f1bca2d
-
SHA256
19da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
-
SHA512
80461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
SSDEEP
24576:8EnIzctHRQQDzSMWcpqIOT22UZAAwHeUb40CGk0NOf+DQ/kP:8sZ11LpqlzUZbwtXpk0NOf+U8
Malware Config
Extracted
remcos
Maly 2023-Host
maly22333.ddnsking.com:3091
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
cos.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
Rmc-GY5GD6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
nsa
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 5 IoCs
pid Process 4584 cos.exe 3752 cos.exe 968 cos.exe 1436 cos.exe 1440 cos.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nsa = "\"C:\\Users\\Admin\\AppData\\Roaming\\cos.exe\"" tmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nsa = "\"C:\\Users\\Admin\\AppData\\Roaming\\cos.exe\"" tmp.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nsa = "\"C:\\Users\\Admin\\AppData\\Roaming\\cos.exe\"" cos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ cos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nsa = "\"C:\\Users\\Admin\\AppData\\Roaming\\cos.exe\"" cos.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tmp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2512 set thread context of 2180 2512 tmp.exe 89 PID 4584 set thread context of 1440 4584 cos.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4584 cos.exe 4584 cos.exe 4584 cos.exe 4584 cos.exe 4584 cos.exe 4584 cos.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4584 cos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1440 cos.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2512 wrote to memory of 2180 2512 tmp.exe 89 PID 2180 wrote to memory of 4584 2180 tmp.exe 90 PID 2180 wrote to memory of 4584 2180 tmp.exe 90 PID 2180 wrote to memory of 4584 2180 tmp.exe 90 PID 4584 wrote to memory of 3752 4584 cos.exe 91 PID 4584 wrote to memory of 3752 4584 cos.exe 91 PID 4584 wrote to memory of 3752 4584 cos.exe 91 PID 4584 wrote to memory of 968 4584 cos.exe 92 PID 4584 wrote to memory of 968 4584 cos.exe 92 PID 4584 wrote to memory of 968 4584 cos.exe 92 PID 4584 wrote to memory of 1436 4584 cos.exe 93 PID 4584 wrote to memory of 1436 4584 cos.exe 93 PID 4584 wrote to memory of 1436 4584 cos.exe 93 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94 PID 4584 wrote to memory of 1440 4584 cos.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\cos.exe"C:\Users\Admin\AppData\Roaming\cos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Roaming\cos.exe"C:\Users\Admin\AppData\Roaming\cos.exe"4⤵
- Executes dropped EXE
PID:3752
-
-
C:\Users\Admin\AppData\Roaming\cos.exe"C:\Users\Admin\AppData\Roaming\cos.exe"4⤵
- Executes dropped EXE
PID:968
-
-
C:\Users\Admin\AppData\Roaming\cos.exe"C:\Users\Admin\AppData\Roaming\cos.exe"4⤵
- Executes dropped EXE
PID:1436
-
-
C:\Users\Admin\AppData\Roaming\cos.exe"C:\Users\Admin\AppData\Roaming\cos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd
-
Filesize
1002KB
MD58adf9b40df999fad8e478c9872f1022f
SHA17a035a3b378422cdc19dac99b80cf3695f1bca2d
SHA25619da8703857a46648c98bac2d6a458309ec882c173253fb8562019f865c94a44
SHA51280461b3ecc965fd0322c7f29584157921b2096728cb29cb5a48f958fc65e996dba5891845f1ca7ab5f927e83aeee89350c9dd2d243ab3c5c7fe1496f6a29f8bd