Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
OSE - PO & FCST - ???-LT24052303183991-01.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OSE - PO & FCST - ???-LT24052303183991-01.exe
Resource
win10v2004-20240426-en
General
-
Target
OSE - PO & FCST - ???-LT24052303183991-01.exe
-
Size
15.0MB
-
MD5
4cbc670c79dddc759b63ded7f36a80e1
-
SHA1
7bf50c94959846e1c7caf521e697ee2367aabf01
-
SHA256
1dd45a1200496700a9a9e138a0ecf1625c981855159ceb8624fe69b8bcfe3bb5
-
SHA512
6bc15e6acbfdcf09e5eefc1fcc02e997ae81c2b9bcbf02df78ba6c3db8c8620130880fa2d6e49a1b3a9e7df2b4f5e428d8cb4326e6679d9e0639dc40ce099535
-
SSDEEP
24576:y6nVMk+HIj90cmvFMN8O6TXQRfAGWEUAxqnRAIsJumwocd5xShmC+a+OPj:xVz7tWqKTXQiTpsJr/Qx8ec
Malware Config
Extracted
remcos
RemoteHost
b64c611.ddnss.eu:3154
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
uytrs.exe
-
copy_folder
iu7y6tr
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
u8tus.dat
-
keylog_flag
false
-
keylog_folder
87y6trf
-
mouse_option
false
-
mutex
OIUGH6-BFBAXD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OSE - PO & FCST - ___-LT24052303183991-01.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation OSE - PO & FCST - ___-LT24052303183991-01.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
Processes:
ttujxo.dllRegSvcs.exepid process 1864 ttujxo.dll 4324 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ttujxo.dlldescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\nueb\\TTUJXO~1.EXE C:\\Users\\Admin\\AppData\\Roaming\\nueb\\HGHNVJ~1.MP3" ttujxo.dll -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ttujxo.dlldescription pid process target process PID 1864 set thread context of 4324 1864 ttujxo.dll RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 4788 ipconfig.exe 964 ipconfig.exe -
Modifies registry class 1 IoCs
Processes:
OSE - PO & FCST - ___-LT24052303183991-01.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings OSE - PO & FCST - ___-LT24052303183991-01.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
ttujxo.dllpid process 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll 1864 ttujxo.dll -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 4324 RegSvcs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
OSE - PO & FCST - ___-LT24052303183991-01.exeWScript.execmd.execmd.exettujxo.dllcmd.exedescription pid process target process PID 1136 wrote to memory of 5052 1136 OSE - PO & FCST - ___-LT24052303183991-01.exe WScript.exe PID 1136 wrote to memory of 5052 1136 OSE - PO & FCST - ___-LT24052303183991-01.exe WScript.exe PID 1136 wrote to memory of 5052 1136 OSE - PO & FCST - ___-LT24052303183991-01.exe WScript.exe PID 5052 wrote to memory of 4672 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4672 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4672 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4236 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4236 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4236 5052 WScript.exe cmd.exe PID 4672 wrote to memory of 4788 4672 cmd.exe ipconfig.exe PID 4672 wrote to memory of 4788 4672 cmd.exe ipconfig.exe PID 4672 wrote to memory of 4788 4672 cmd.exe ipconfig.exe PID 4236 wrote to memory of 1864 4236 cmd.exe ttujxo.dll PID 4236 wrote to memory of 1864 4236 cmd.exe ttujxo.dll PID 4236 wrote to memory of 1864 4236 cmd.exe ttujxo.dll PID 1864 wrote to memory of 4324 1864 ttujxo.dll RegSvcs.exe PID 1864 wrote to memory of 4324 1864 ttujxo.dll RegSvcs.exe PID 1864 wrote to memory of 4324 1864 ttujxo.dll RegSvcs.exe PID 1864 wrote to memory of 4324 1864 ttujxo.dll RegSvcs.exe PID 5052 wrote to memory of 4612 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4612 5052 WScript.exe cmd.exe PID 5052 wrote to memory of 4612 5052 WScript.exe cmd.exe PID 4612 wrote to memory of 964 4612 cmd.exe ipconfig.exe PID 4612 wrote to memory of 964 4612 cmd.exe ipconfig.exe PID 4612 wrote to memory of 964 4612 cmd.exe ipconfig.exe PID 1864 wrote to memory of 4324 1864 ttujxo.dll RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OSE - PO & FCST - ___-LT24052303183991-01.exe"C:\Users\Admin\AppData\Local\Temp\OSE - PO & FCST - ___-LT24052303183991-01.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\dvlv.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ttujxo.dll hghnvjmhol.mp33⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ttujxo.dllttujxo.dll hghnvjmhol.mp34⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\87y6trf\u8tus.datFilesize
144B
MD573e56f9511ff5e60e57038806c511d82
SHA112ef16edb2dc029bc04e15070fa127c9dba0e86f
SHA256db25cc83bf60a813cc2cef52b293c42077c5f3d204ab58a09f8fb6acec2e8526
SHA51237912c03923dc46bd33352d1bb1521b9f0e5e7ff377c4a50c4d909de8859d35db8b55b3a640584bc7eec7840cf99278548c7cb6250eacf30da4915800dcceb93
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\adkwpjv.jpgFilesize
554B
MD5ddbce26710f45a539e8601e0a447934f
SHA1b3d2be9eaaa912cc3ade2fcbab287ae8b8c6b46c
SHA2567d11a8485973e0bc566c1db8fdd856c330912875f6b5ab926055566442d3aaa8
SHA512cf5f5ba1909ec80e016e08d431bd6e0729a6c7730571d1658f4359f593899e43f014123199b66e6cca01799bd08d8cb5107ac1c5fb8f69983122339e187dd9e2
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\akxhkp.xlFilesize
586B
MD51470895a9833ec3d6efcbf513344c2f1
SHA114f065147f0a071e8359372256dfc8fe6036c102
SHA25630bc8aee625a4fc70fb99eb0fe99aae51101a78fc1d7ce6cf88b9ad8b974225c
SHA512686c5e2c276ccf80dd5211dd3338964368ae3e74b23b258841c5646cf31157cbbc8a7b8e23f17f8430d312076f12b51493529255c5d4f5acba2700def1690a40
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ccfuehe.txtFilesize
548B
MD5c302f688094bc56571eb12370fcf141c
SHA12a8c53ade2a08aafdb9494120ea9b4fd700ad094
SHA256ea4fc55e495c8888425bd5d58ca715629bc6394cadec75aa4584c38f5639118c
SHA5123c977e3aab36ed2713234de9683a98d53fc03d8462812d642ef82c7eac61896aba233e1d3f8464bd6366a7875cb24c450b853c341253e15e47c454dd320ea4cd
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\dqvn.icsFilesize
882KB
MD5e171c9f38793118e7905b2f02689d3de
SHA174536f29cce7dbb80c54f885edb260847185a8ae
SHA256b7a631d237298b76fc459dc3046bd310a3e9dcb57112caf478b08592a9e0d143
SHA512d5d6041babb8ff290485ebd43e01e39fd21014ebd77ec5114a687cdf7d70179136cab304e76780ffd7971303343f868442d25f453e8674744fc8a0cb4a951961
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\dvlv.vbeFilesize
84KB
MD56e08612ee9e89454fcbf9cd29aaed06c
SHA18c85626b1a89d18ed1379beb5ac8456ab97bb3c3
SHA256b0ecd1e6ab42c8c2872837818659757d25a45759d94233f8bb792a460bd779e7
SHA512419a8dfec5f90977e987a40fc09e6fce25e54f508cc1d4abd60d73f35e054f53d58084e70daea2c44b42b1731b7446b7c74470089ff703268d9fe07d245f9bf4
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\eaxutnil.exeFilesize
625B
MD593066def3dc388de942d3f7315ff6a1f
SHA175b4fb0563252d95d0997832de5230ffeaa81e83
SHA256e84a46926dc23fc9ae49b564e0350187faa1233abdda99fc16c050a224950b31
SHA512044ce13ade56ec4dc7c170a0c16356467df7e79091b2f69a405cb23fd3c1aaea08cb5fbf336b3da86b00f20fadcbcd25949981c0a5055b5fc7bf7e9e4e952b1a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\hhhsam.icmFilesize
560B
MD552601f432c71a83460703926660dd847
SHA1bf28d10b021c961ccccc160eafad3304669d12c9
SHA25690ca364fa9f567cf377238ed00778fc89bd4e6edda37d1bfc08359152d523ce1
SHA5128945b1081cda9074427a535f9665c6f48a784d9ab66ece34264c9dae52cf901531d1261149ecaf611a07d3481f941a8b2f804db6768480d17c2cd5e0b313c672
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ixvwpug.xlsFilesize
529B
MD5054d4a1745a1bdff1309309b754944cf
SHA1c3e865f3df5bac877d9d07ecfbe12123fc2a7f43
SHA25682a02b6a19ef473dd8658f1ac296972f384c40cdb9d7066bb59d6896e7ca4faf
SHA5125f2f5b328e0c6446655b74babbfbc4da98bf0bddcb779092d95fc2b846ead1d2ae51257b8e0b8c6815f481911e7732dff9b8a9a9bbd1e8eb396427b635be524a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\kausl.mscFilesize
550B
MD583e1f0086b62a6427528aee6aac20490
SHA1555581c05b82c5b5c23176e009a71833ca92f94d
SHA2565dfcd6be5cbd28f62c03acfd5e3b5b556887826da98fea9ad4527577a4fa0ed4
SHA512b1ccf1a71573770202b3ad647baa23562319f22a093d00da316613c317df8fc79c5de089c264c2649eec9ce984c9ae1ad807ad1aca3901d0bb3b354406ab6764
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\kpklatl.pdfFilesize
596B
MD5218c5d5d78f00bed6d7a1796a3dacd50
SHA12425e26f1285032c1eb753c38c8e4184e11c5f4e
SHA256b214487887bfec30ccf89d31c79c9e8a4b997b6f128d5f35d7a0b5d41475de42
SHA5126e519e25cb5ce0f9c4e4a2174f4fb438264bda087116865db2e5bd9e9538d8a91d37f1935fb2316d574063a35f13d5006e242f288f449e445c3d6f6d3626fe7e
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\psud.jpgFilesize
649B
MD568057a3ababb53cc194305aafb678316
SHA16a9d23fd3b1d7ca21a1f73ae10e79d526e53ae9e
SHA256beedd19808df570ba564bb5eba0ce432346d23285f854523914b234c9879f810
SHA5120d8fe180c407e3c5866cf2c4448cbafc734e047deba2943e0491f81b730a830828669ed859dfe43b82145b6769cfbdc52aba1d882b5ea3a4978f94ac9ed5e691
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\pthiwoamn.binFilesize
34KB
MD5bb04e48350eb8c97b835ef2bf8310ca1
SHA1a9a8364c25d2ec7bbc9700543ac4361abad1bacf
SHA2560abedc60fda83fcad7c3b8d40e8cc6159b8bb033ea9dc0a1e24ee8d5118407c0
SHA512956e72c43a58da659a4c840c7ba1052e689ea225528c586d0ee0c8b43807280ff8f149c7ce531ec25d5d95a4a434618ff4e3e6b5043a0db234112cde4ba31ba1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\pthiwoamn.binFilesize
34KB
MD5197d5b4cf8de9940b5fdcad912ab949d
SHA124ba8d11bfc96821a4fcbf56e6b6713ad0c79ac7
SHA256db755fda24ff2b5cd7fbd953dc523298d0c4cf4029b4c3efc27559ccb8f37f83
SHA512b23a5d38340a732be91cc0d2faf8dad8bd3f8abf868e5801c3bcdf90bcc376c53ab8d254efebf165ba5f5b840db5e01123e8d544cd86ce5faa6a43436d8ce6e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qurddcxnm.dllFilesize
620B
MD53c5bcc0ec42d859aa04884c22acbf316
SHA18f17c190b9499d184f2d275ebe1e9c5fbdde77c8
SHA256152aef9576a636e3e816316af35335e9ea7975578663ef09abd9a92151c89cf7
SHA51206fcbff1552ee01480bdb989edad0a8f6e8e66a7e7d45d64a5b033b6dd1f7c0ba9006f7f59db1034a78d4006eba393ecdf349d6b29c3d7024c801a586ccb5c00
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\tlifisl.docxFilesize
646B
MD5de8d472a3d4669f06d925922a1634ac7
SHA1a7ad5663c99c54a3f4cd12a82568e91f8be75d44
SHA25614ea61c83d53e06f750ddcfd89edf54e17a0d91f8436b801f79892172785db92
SHA512cd2fc7b4363f8b38af60afa70dad82612d49f441d3442fcc24096429f4a68316fbbda993c0277f22ebfc052e698e61ec9c3ef0290eca8651d2fd73c85ce46236
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ttujxo.dllFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\tufkdrjntj.mp2Filesize
642B
MD528a66e58594a445f3efbe8c8e4010ee5
SHA1cd8822bcc7bce5be52bb97b344adaeb4eca43ae7
SHA256528166f38e46858c3c46e2fcffb2baccc77b558799e83acc0d598d36225c8a57
SHA512b082203870dacd4b710c9495e4618e2633c6e3460399e61127f25432c05ccc9a553d082536ef88c222f2d1673d572d6caad9c5934a6c70db94e7bd3696f2342f
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\twklhta.txtFilesize
507B
MD5de7ca529b6fea56a907eca2d3e748245
SHA151078d21b189329107fc46778a841574c88257f6
SHA256024718705fce4644cb98c19687383729ecef949e88576a6421a1d77179fce678
SHA512c7c65617025f0f191e7b9e475f849cedd0ff1168362c6fc011b105d6d188ba59b520ea6b7a6a9fafc71a983f70ff882b3b766d65addb3e3078056ffe1772e6f6
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\vkhuddrb.pptFilesize
503B
MD518a894cfb8cbc95827c54524ebbdb5bd
SHA19eb1e8edc274224fabc9b9828beba114d3442594
SHA256f94bdca1bc2f36f20a4731a980779bc85fb9f9e022bbedcb6b85ae12fcbd851d
SHA5127f5e62c8fde6b1728754246cc37b8e97d0f5ef553d5b10e695bed292607354a09300c8dfc5a5acc077b74d93715546d3f38e249a5245cd6ec81b06649770ce25
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\wrprwamnt.mscFilesize
547B
MD5d6f3f07c28fc3423a098297f1b7987eb
SHA1214c4154bbac33f603ec27ad2dc059212fa06f14
SHA2563508682f67971cd41747e16734c952fb223875284dcbec53801b26346abfcea5
SHA5129410805203005d3964f4c9ba8099477a7451da4663a3e5ba99b2a9c396aa2464eb6050fba722f0786be7e90fe97e806bf51b25c381b45870c217021f82088a06
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
memory/4324-132-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-141-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-125-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-130-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-126-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-133-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-131-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-123-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-142-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-129-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-150-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-149-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-157-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-165-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB
-
memory/4324-166-0x0000000000D00000-0x0000000001D00000-memory.dmpFilesize
16.0MB