Analysis
-
max time kernel
7s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
MonkeModManager.exe
Resource
win7-20231215-en
General
-
Target
MonkeModManager.exe
-
Size
146KB
-
MD5
81933ce5ca9beb8efb6c431bc6505361
-
SHA1
7f88cc2b8e40a2f485f9062fc8bba4ac2793c20a
-
SHA256
ae4803897d99ebbce5ef7bb65155c70aa8496188c769f9b5829aee8d62ec8d82
-
SHA512
debad62cb7928bafc1aebf84933fe64afe7dfea06ef01588509ec7b4283a4a07eed584f40e28e40c626295c3b357b469397a664e65b90cf04d530531daddd4a8
-
SSDEEP
1536:z3rY49c1TiyDZESAkt4+UM3upJ7ak5C3kIJfmGY9lToGI7J3z+InbSPqZuBsv032:brYlEkXb+pJWkjbI936aSPqZuE090
Malware Config
Extracted
remcos
1.7 Pro
Host
shall-someone.gl.at.ply.gg:60408
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
vindevs
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_kixjmsbwpikjkoa
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
60
-
startup_value
Dlscord
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
dead-reviewer.gl.at.ply.gg:60161
90319c19387bbc36810cf2f727f01c05
-
reg_key
90319c19387bbc36810cf2f727f01c05
-
splitter
|'|'|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Gebrrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Gebrrr.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Dlscord = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Gebrrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Gebrrr.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2228 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2268 Gebrrr.exe 2832 Sczbl.bat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Gebrrr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Gebrrr.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ Gebrrr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2680 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2268 1620 MonkeModManager.exe 28 PID 1620 wrote to memory of 2268 1620 MonkeModManager.exe 28 PID 1620 wrote to memory of 2268 1620 MonkeModManager.exe 28 PID 1620 wrote to memory of 2268 1620 MonkeModManager.exe 28 PID 1620 wrote to memory of 2832 1620 MonkeModManager.exe 29 PID 1620 wrote to memory of 2832 1620 MonkeModManager.exe 29 PID 1620 wrote to memory of 2832 1620 MonkeModManager.exe 29 PID 1620 wrote to memory of 2832 1620 MonkeModManager.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\MonkeModManager.exe"C:\Users\Admin\AppData\Local\Temp\MonkeModManager.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Gebrrr.exe"C:\Users\Admin\AppData\Local\Temp\Gebrrr.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵PID:2728
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2680
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"4⤵PID:2516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Sczbl.bat"C:\Users\Admin\AppData\Local\Temp\Sczbl.bat"2⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵PID:2956
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:2228
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"1⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "2⤵PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD570511857009d49466fc0142897c2e3da
SHA199c1ddef94ee78b88cd187cd3e89e58844485df9
SHA25661265241dfd56fd0d597fad87c8f50f72bb6b851787117040404bbce79669bb4
SHA512f5fb472adac8299ff53d83a826c273ab7e3dd91ed735f683f672314161411cb23fd80e25ad7b65e07e176b7edd696203384826b5270cd417c2f19b89efaa8b7a
-
Filesize
14KB
MD59200fc964b0803c4baac4538679ee4c4
SHA1bc0e0f2d8df1c7b6609a61175a08e076a23324ee
SHA25673f54f5d57a486c511570174ee217647da8554a0900e35997bcb03c7349b4426
SHA51269579c2493e7c231335cf9201e0e07fd80548e97db2a94c1f4d201473b808787dacf90134fe41234a3d197ef7393d6b47259c7df9b194e9a5cae8c3f1869ffff
-
Filesize
1KB
MD55a42aa7f2d6cd8633cca746f0e74bc57
SHA190af3b9514055992b28722610f35d3503f28d678
SHA2565e63b3ce6ad8bf64241ad0b75b241e0b2ec1db83b4d8d2d88389aa3a8e9bf9dd
SHA51295eda10757f78f12f25f867d1f47bd5df3424d8de543fd7cbdffe14b9a4ccaf7021d127bcd2c624095c03d4a269f3d59895fa1ba3fffbf640531f29bc9e415c3
-
Filesize
1KB
MD5ca793a55bc6bf8fc9916bf19f8d2c4e9
SHA194ed1be2f280775a1f5297d68e3f8b301812ffd5
SHA2565e2a9c04291362d4cc76bc2be41e788565f2c8bd166b61e180b76020cbf3af43
SHA512da1dc50c6d4178ea34755e478fdbcbe7f1050cf75b69f55038d48b50afe56e2131b007407f19dafb1f55b7aa3087bba0c1fd82f861bf0b59a70894114c75412c
-
Filesize
99B
MD576c1687d97dfdbcea62ef1490bec5001
SHA15f4d1aeafa7d840cde67b76f97416dd68efd1bed
SHA25679f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4
SHA512da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925
-
Filesize
19KB
MD5c2acf4bef17036513c62ea40124333c6
SHA18034af4488df229d1e08977fb5fbb15111503228
SHA256588a8f4d9b1ea9209b58acaadf2ec6f605495d6d4daad70958744189fdc4ba65
SHA512bd3e522bdcc3e9766b96dc4bb89d8276497a48cf0f7e21f1cd027e50dd412eeaea23a07ee7109b1d7c1732c84c41e2774bd283f6b9195ab9cf1dd14c0cdf1e50
-
Filesize
10KB
MD5a4a01c8c34c139ee9c6562fc359a5c59
SHA17abb9c5868b1e4425409f27aba0ad53889ccec17
SHA2565e7744eab1d23a0912b7adf8f97a8cc268a796ace816e144581d4a579d4a1d4f
SHA512bc5184b0d7b499ee06b0f48e09c23d2be10ff0bd3e8ac5a26ffff46b50dfd8d451a465fd38bca8582344b09e828bafa9a27d0cb37df39c82c2c5929bd07cf60e
-
Filesize
202B
MD51a2a2b4920ba8fddac485fcfbec7a1aa
SHA1b5b7b32de1afc061f16797e34956dcdc3e11033b
SHA25678bbe8f6d45d07e8ad7d701e4b7bb26f14a1c513a44dce44b54781d3667eb62c
SHA5126507dcd331eaf565ae583dad8c362db45bf753840af4972d701c88039ef1bf975a82be90d5883c8a3916bc05170076ce33f79dd91a2d9d57293aa3acb3c6158d
-
Filesize
4B
MD57a8184d640ef6cdf954a7f10b80dc908
SHA1541efc229f03c114a3e8f8413a293947e2578e82
SHA256f82cb3b7c58b97a0b99662278b17e1cfb211ac7db5640f116ee2cc78475a1887
SHA512cfa2535b3f842bc525b5d07053fd0267bbdea903364965971b472a172395c557d716b3caa5330a80c197331ce6b0fa6c1d3cb9bed4ae290fc4a8190479425659
-
Filesize
25KB
MD5ce8130a325de84cf9368b6ad723da71a
SHA1490a5db325ad7649fef5f9b3145a6b8e26466954
SHA256271fa72b34f557f9115193b0a9b360262371df92512707c3866c78dcbca4fa7d
SHA512d69f6255e5b063efce165a62015501caa241e1fae02b706ef355170d99d0323ffe50641933e1e3b01c3eeb5664b5c64eb804ac2291b8a2575e14d148378743f2
-
Filesize
93KB
MD5a2678bbd0eace916ffeb692085da3ce3
SHA14962672978e14a77eddc7992296faa88f68cfc0e
SHA2560d1e495ca174082e5f51835d1fab22a9a664e83dd06cbd6670617cbb1c30a456
SHA5128f773d8bf5389953d886074f9da65e7114479d05e63f1f60da66db89381e06d5c9e8780d03131d89ffe01c1be5daf5c020fa201ded7048d70c15f9261752d861
-
Filesize
52KB
MD50e65c9a4fafdb2e3f68449fb6cd38ac2
SHA1118cb21966f77c4b69ced753a95f14ad534db911
SHA256793a9bf896a893384356aa8ee0ec486abfb7bbbfc9e2a461c7dfab25ba94ec22
SHA512b99d871674da7f70b2b35947c5aceb9ddae9c54c6b1bfa7d7a3d17ce51effd40287e5ba4c30a7484d08669ba7178107366c4a8c495f7291ec528b8a0e396fc0e
-
Filesize
52KB
MD574eb1d86d06d96c71d4dbf7f7720f8ea
SHA1f86ea92707a8a0d5256283798ce3847ef74703a3
SHA256952008eedd34141bbba424458aca31b63b7d3ba088debeb50c023cd4564e32c2
SHA51263534827478946884ba736e33ec6e63dd16a7168e7c49afed04c59b6a6c588184d2ef28250ee020fe4875c32f6b7c64d5159ed69b9ba0ed9d98f8f83febcb63b