Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 02:23
Static task
static1
Behavioral task
behavioral1
Sample
087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe
Resource
win10v2004-20230703-en
General
-
Target
087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe
-
Size
338KB
-
MD5
df0dfed7d9bb8ffc5ac307ef14dd86ed
-
SHA1
ecf99b4bae23c5a2da6866fe20ca86a1a3bec012
-
SHA256
087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0
-
SHA512
d903253529677775d8e58ed5405366ca5dbc04f781e99d5ba1d0ab38ff1c3e4296e4fa7b4042bd38b62eac6fb9c260d9b16e324294205d0cc4aceb6ec92d3228
-
SSDEEP
6144:cmOPKXTWo8aBPyT2PvEIOzalVa0vjntlcrjDpWgs/oiTrVYdHjKHnLXmfIEM:zSo8aBPk2nEhelRTtlc3D8gkoiL/
Malware Config
Extracted
remcos
LOGS
23.19.87.242:1987
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
chromes.exe
-
copy_folder
chromes
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QBX5A0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks QEMU agent file 2 TTPs 4 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe chromes.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe chromes.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 chromes.exe -
Loads dropped DLL 6 IoCs
pid Process 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 2300 chromes.exe 2300 chromes.exe 1056 chromes.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-QBX5A0 = "\"C:\\ProgramData\\chromes\\chromes.exe\"" chromes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-QBX5A0 = "\"C:\\ProgramData\\chromes\\chromes.exe\"" chromes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\skrvenes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Indaandingers\\Frugtfarverne.exe" 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-QBX5A0 = "\"C:\\ProgramData\\chromes\\chromes.exe\"" 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-QBX5A0 = "\"C:\\ProgramData\\chromes\\chromes.exe\"" 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\skrvenes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Indaandingers\\Frugtfarverne.exe" chromes.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\basipterygium\checkmates\tapetsermestrenes\apologizer.Cos 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe File opened for modification C:\Windows\SysWOW64\basipterygium\checkmates\tapetsermestrenes\apologizer.Cos chromes.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 1056 chromes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 2300 chromes.exe 1056 chromes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2896 set thread context of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2300 set thread context of 1056 2300 chromes.exe 34 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\svrddanses.Bes203 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe File opened for modification C:\Windows\resources\0409\zoometrical.bla 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe File opened for modification C:\Windows\resources\svrddanses.Bes203 chromes.exe File opened for modification C:\Windows\resources\0409\zoometrical.bla chromes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 2300 chromes.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 2896 wrote to memory of 920 2896 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 28 PID 920 wrote to memory of 2300 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 33 PID 920 wrote to memory of 2300 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 33 PID 920 wrote to memory of 2300 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 33 PID 920 wrote to memory of 2300 920 087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe 33 PID 2300 wrote to memory of 1056 2300 chromes.exe 34 PID 2300 wrote to memory of 1056 2300 chromes.exe 34 PID 2300 wrote to memory of 1056 2300 chromes.exe 34 PID 2300 wrote to memory of 1056 2300 chromes.exe 34 PID 2300 wrote to memory of 1056 2300 chromes.exe 34 PID 2300 wrote to memory of 1056 2300 chromes.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe"C:\Users\Admin\AppData\Local\Temp\087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe"C:\Users\Admin\AppData\Local\Temp\087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0.exe"2⤵
- Checks QEMU agent file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:920 -
C:\ProgramData\chromes\chromes.exe"C:\ProgramData\chromes\chromes.exe"3⤵
- Checks QEMU agent file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\ProgramData\chromes\chromes.exe"C:\ProgramData\chromes\chromes.exe"4⤵
- Checks QEMU agent file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD5df0dfed7d9bb8ffc5ac307ef14dd86ed
SHA1ecf99b4bae23c5a2da6866fe20ca86a1a3bec012
SHA256087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0
SHA512d903253529677775d8e58ed5405366ca5dbc04f781e99d5ba1d0ab38ff1c3e4296e4fa7b4042bd38b62eac6fb9c260d9b16e324294205d0cc4aceb6ec92d3228
-
Filesize
338KB
MD5df0dfed7d9bb8ffc5ac307ef14dd86ed
SHA1ecf99b4bae23c5a2da6866fe20ca86a1a3bec012
SHA256087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0
SHA512d903253529677775d8e58ed5405366ca5dbc04f781e99d5ba1d0ab38ff1c3e4296e4fa7b4042bd38b62eac6fb9c260d9b16e324294205d0cc4aceb6ec92d3228
-
Filesize
338KB
MD5df0dfed7d9bb8ffc5ac307ef14dd86ed
SHA1ecf99b4bae23c5a2da6866fe20ca86a1a3bec012
SHA256087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0
SHA512d903253529677775d8e58ed5405366ca5dbc04f781e99d5ba1d0ab38ff1c3e4296e4fa7b4042bd38b62eac6fb9c260d9b16e324294205d0cc4aceb6ec92d3228
-
Filesize
338KB
MD59093053ece8864928d9857a096348413
SHA1b5766029bff96e6ef585255122cc2aff40ba4a4e
SHA256a23a851b31b7018e4822e18c46a302cd1c794c47df47a877a922074df5a904b2
SHA512eae5412a749a1a6cf6cfbbe77e0e4ab6104f432339da6e0f552ffab029e743df78c9aebc755d90743b9d803cdcacf252aef073423c11d6a06b40ddd52705af52
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
C:\Users\Admin\AppData\Roaming\totaquina\praksisndringen\skuddag\Aqualungers\Rosinwood\Gages\Dother.Dri
Filesize226KB
MD59f0f014db0749aca19fdf8bbe52d39ef
SHA11c226cea1ad77880045abbde9f846f6d84d1787f
SHA25613c39ef6962a3c73ce40551366568d8b38c54dc6eb1b079647569c5ee6596c07
SHA512dde9a209a3d0a7c99deaf5951754c8271194ec39bb38ad165b6cda5d3afe1d3a167adcc38c0c933ad9b98861f6a22eeabc09a3aff9e3951172690af3edc3c318
-
Filesize
16KB
MD5727641d4c4b10e37d73f3021ae9a2f15
SHA145f4d81ad8e55880d29274567e6c1a1a52c98e00
SHA2563725e7823cee82fca73f82d29caf203d582e2ec7ffd5fe3f34b2d172368086ab
SHA512ab206f5ab13f3f1f2ddb29b3c2d2df8908fc566c212c6c6228aeef371809728e65798e9da3a70e878336a53839348965572e566e0c3c4e725de2a9c75195c46e
-
Filesize
338KB
MD5df0dfed7d9bb8ffc5ac307ef14dd86ed
SHA1ecf99b4bae23c5a2da6866fe20ca86a1a3bec012
SHA256087660dc2a6b875e634ec97e02989bda25dacd024de28c35bcf0597c654046e0
SHA512d903253529677775d8e58ed5405366ca5dbc04f781e99d5ba1d0ab38ff1c3e4296e4fa7b4042bd38b62eac6fb9c260d9b16e324294205d0cc4aceb6ec92d3228
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b