Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/01/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
ballsack e.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
ballsack e.exe
Resource
win10v2004-20231222-en
General
-
Target
ballsack e.exe
-
Size
36KB
-
MD5
644f18453d3e3874b8cd64374dcebc9e
-
SHA1
0118997f0114b4a1f090f35d6321d43fe036951a
-
SHA256
42013a222c8b3840f8242c0664f46fa3776b9e1cddae157fd208d15ba2c49055
-
SHA512
81bb87a9295587999d9b2661a92615a235084d44dedbf726f7fffc3db693d42847e85ca9cf4420297214120703e291bef29be9f3b057f9851acaf45f0e32b31e
-
SSDEEP
768:PNnmZ/8vPlLUdhfJ8v6utFpVsuRregrWChgzub7Dsr1:Fnwu4DejVLyOhgzuYr
Malware Config
Extracted
remcos
1.7 Pro
Host
shall-someone.gl.at.ply.gg:60408
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
jeava.exe
-
copy_folder
jdk683623
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
vindevs
-
keylog_path
%AppData%
-
mouse_option
true
-
mutex
remcos_kixjmsbwpikjkoa
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
60
-
startup_value
Dlscord
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" jeava.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" jeava.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" ballsack e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" ballsack e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ballsack e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ jeava.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" ballsack e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run jeava.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" jeava.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ballsack e.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 jeava.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" ballsack e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3213149797-706813642-929964373-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" jeava.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" jeava.exe Set value (str) \REGISTRY\USER\S-1-5-21-3213149797-706813642-929964373-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dlscord = "\"C:\\Windows\\SysWOW64\\jdk683623\\jeava.exe\"" ballsack e.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ ballsack e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ jeava.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jdk683623\jeava.exe ballsack e.exe File opened for modification C:\Windows\SysWOW64\jdk683623 ballsack e.exe File created C:\Windows\SysWOW64\jdk683623\jeava.exe ballsack e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1736 set thread context of 2056 1736 jeava.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 948 reg.exe 4848 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4780 PING.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2568 wrote to memory of 248 2568 ballsack e.exe 79 PID 2568 wrote to memory of 248 2568 ballsack e.exe 79 PID 2568 wrote to memory of 248 2568 ballsack e.exe 79 PID 248 wrote to memory of 948 248 cmd.exe 81 PID 248 wrote to memory of 948 248 cmd.exe 81 PID 248 wrote to memory of 948 248 cmd.exe 81 PID 2568 wrote to memory of 3884 2568 ballsack e.exe 82 PID 2568 wrote to memory of 3884 2568 ballsack e.exe 82 PID 2568 wrote to memory of 3884 2568 ballsack e.exe 82 PID 3884 wrote to memory of 4780 3884 cmd.exe 84 PID 3884 wrote to memory of 4780 3884 cmd.exe 84 PID 3884 wrote to memory of 4780 3884 cmd.exe 84 PID 3884 wrote to memory of 1736 3884 cmd.exe 85 PID 3884 wrote to memory of 1736 3884 cmd.exe 85 PID 3884 wrote to memory of 1736 3884 cmd.exe 85 PID 1736 wrote to memory of 1760 1736 jeava.exe 86 PID 1736 wrote to memory of 1760 1736 jeava.exe 86 PID 1736 wrote to memory of 1760 1736 jeava.exe 86 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1736 wrote to memory of 2056 1736 jeava.exe 87 PID 1760 wrote to memory of 4848 1760 cmd.exe 89 PID 1760 wrote to memory of 4848 1760 cmd.exe 89 PID 1760 wrote to memory of 4848 1760 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ballsack e.exe"C:\Users\Admin\AppData\Local\Temp\ballsack e.exe"1⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:4780
-
-
C:\Windows\SysWOW64\jdk683623\jeava.exe"C:\Windows\SysWOW64\jdk683623\jeava.exe"3⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:4848
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:2056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD5d261161d84c1119ba526b75df8123299
SHA18e11e70f6d31c781f389f892c8330b61bd1ff370
SHA256a3e8bb0a185943fd76d014d2ed0d2dcc33153fbb87bb952304674feaeaeb22a5
SHA512ff9b8b5d21460a245574425d95d9e9a6b2c2350b313e8108bf5c8f66519eca5f2160e52ee49b6460a69b6fdccc9f926c2cd9e967ba0a40f490a9aed69cc5d351
-
Filesize
36KB
MD5644f18453d3e3874b8cd64374dcebc9e
SHA10118997f0114b4a1f090f35d6321d43fe036951a
SHA25642013a222c8b3840f8242c0664f46fa3776b9e1cddae157fd208d15ba2c49055
SHA51281bb87a9295587999d9b2661a92615a235084d44dedbf726f7fffc3db693d42847e85ca9cf4420297214120703e291bef29be9f3b057f9851acaf45f0e32b31e