Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 18:57
Behavioral task
behavioral1
Sample
cbab80f7f17d6c3830a17d7fee29cd30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cbab80f7f17d6c3830a17d7fee29cd30N.exe
Resource
win10v2004-20240802-en
General
-
Target
cbab80f7f17d6c3830a17d7fee29cd30N.exe
-
Size
483KB
-
MD5
cbab80f7f17d6c3830a17d7fee29cd30
-
SHA1
701eb7c9e2b662728f23dfaa34e634f11847aad7
-
SHA256
eea9c58429ef1465aa760fada958b5d580e3ea0c2a40a7c11de9f5518f661706
-
SHA512
e5b0acbeadadb3e75e2b8aa4794ab5fabe41de92dabc46120c84c6e0000da55900eecd7d12f1bb1a392b0dc9dbcb1e97fa7bf54a8281e6ebb2ca100d2c91fb90
-
SSDEEP
6144:wTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccrRT4:wTlrYw1RUh3NFn+N5WfIQIjbs/ZBKT4
Malware Config
Extracted
remcos
RemoteHost
mode-clusters.gl.at.ply.gg:36304
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
$77-Update of anti root
-
copy_folder
WinDMRmanager
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-W4O1LZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" cbab80f7f17d6c3830a17d7fee29cd30N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cbab80f7f17d6c3830a17d7fee29cd30N.exe -
Deletes itself 1 IoCs
pid Process 4892 iexplore.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" cbab80f7f17d6c3830a17d7fee29cd30N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" cbab80f7f17d6c3830a17d7fee29cd30N.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-W4O1LZ = "\"C:\\Windows\\SysWOW64\\WinDMRmanager\\$77-Update of anti root\"" iexplore.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDMRmanager\$77-Update of anti root cbab80f7f17d6c3830a17d7fee29cd30N.exe File opened for modification C:\Windows\SysWOW64\WinDMRmanager\$77-Update of anti root cbab80f7f17d6c3830a17d7fee29cd30N.exe File opened for modification C:\Windows\SysWOW64\WinDMRmanager cbab80f7f17d6c3830a17d7fee29cd30N.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4100 set thread context of 4892 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 88 PID 4892 set thread context of 1072 4892 iexplore.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbab80f7f17d6c3830a17d7fee29cd30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1704 reg.exe 1640 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 4892 iexplore.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3480 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 84 PID 4100 wrote to memory of 3480 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 84 PID 4100 wrote to memory of 3480 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 84 PID 3480 wrote to memory of 1704 3480 cmd.exe 86 PID 3480 wrote to memory of 1704 3480 cmd.exe 86 PID 3480 wrote to memory of 1704 3480 cmd.exe 86 PID 4100 wrote to memory of 4892 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 88 PID 4100 wrote to memory of 4892 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 88 PID 4100 wrote to memory of 4892 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 88 PID 4100 wrote to memory of 4892 4100 cbab80f7f17d6c3830a17d7fee29cd30N.exe 88 PID 4892 wrote to memory of 1400 4892 iexplore.exe 89 PID 4892 wrote to memory of 1400 4892 iexplore.exe 89 PID 4892 wrote to memory of 1400 4892 iexplore.exe 89 PID 4892 wrote to memory of 1072 4892 iexplore.exe 91 PID 4892 wrote to memory of 1072 4892 iexplore.exe 91 PID 4892 wrote to memory of 1072 4892 iexplore.exe 91 PID 4892 wrote to memory of 1072 4892 iexplore.exe 91 PID 1400 wrote to memory of 1640 1400 cmd.exe 92 PID 1400 wrote to memory of 1640 1400 cmd.exe 92 PID 1400 wrote to memory of 1640 1400 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbab80f7f17d6c3830a17d7fee29cd30N.exe"C:\Users\Admin\AppData\Local\Temp\cbab80f7f17d6c3830a17d7fee29cd30N.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1704
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"2⤵
- Adds policy Run key to start application
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1640
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1072
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5cbab80f7f17d6c3830a17d7fee29cd30
SHA1701eb7c9e2b662728f23dfaa34e634f11847aad7
SHA256eea9c58429ef1465aa760fada958b5d580e3ea0c2a40a7c11de9f5518f661706
SHA512e5b0acbeadadb3e75e2b8aa4794ab5fabe41de92dabc46120c84c6e0000da55900eecd7d12f1bb1a392b0dc9dbcb1e97fa7bf54a8281e6ebb2ca100d2c91fb90