Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 22:05
Behavioral task
behavioral1
Sample
luna.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
luna.exe
Resource
win10v2004-20241007-en
General
-
Target
luna.exe
-
Size
469KB
-
MD5
e60cc75120901abeb61e9fb76cbf96ec
-
SHA1
228bb950e891943002c0c7f604f3c3feff6d135b
-
SHA256
ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
-
SHA512
6de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSdPn9:uiLJbpI7I2WhQqZ7dP9
Malware Config
Extracted
remcos
RemoteHost
it-double.gl.at.ply.gg:37981
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Security.exe
-
copy_folder
system64
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z7BY2N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Windows Recovery
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation luna.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 3104 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 Security.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\system64\Security.exe luna.exe File opened for modification C:\Windows\SysWOW64\system64\Security.exe luna.exe File opened for modification C:\Windows\SysWOW64\system64 luna.exe File opened for modification C:\Windows\SysWOW64\system64 iexplore.exe File opened for modification C:\Windows\SysWOW64\system64\Security.exe iexplore.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2064 set thread context of 2244 2064 Security.exe 95 PID 2244 set thread context of 3008 2244 iexplore.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings luna.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings iexplore.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 216 reg.exe 2284 reg.exe 2264 reg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2064 Security.exe 2244 iexplore.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1532 wrote to memory of 4032 1532 luna.exe 84 PID 1532 wrote to memory of 4032 1532 luna.exe 84 PID 1532 wrote to memory of 4032 1532 luna.exe 84 PID 4032 wrote to memory of 216 4032 cmd.exe 86 PID 4032 wrote to memory of 216 4032 cmd.exe 86 PID 4032 wrote to memory of 216 4032 cmd.exe 86 PID 1532 wrote to memory of 3104 1532 luna.exe 87 PID 1532 wrote to memory of 3104 1532 luna.exe 87 PID 1532 wrote to memory of 3104 1532 luna.exe 87 PID 3104 wrote to memory of 1160 3104 WScript.exe 91 PID 3104 wrote to memory of 1160 3104 WScript.exe 91 PID 3104 wrote to memory of 1160 3104 WScript.exe 91 PID 1160 wrote to memory of 2064 1160 cmd.exe 93 PID 1160 wrote to memory of 2064 1160 cmd.exe 93 PID 1160 wrote to memory of 2064 1160 cmd.exe 93 PID 2064 wrote to memory of 3968 2064 Security.exe 94 PID 2064 wrote to memory of 3968 2064 Security.exe 94 PID 2064 wrote to memory of 3968 2064 Security.exe 94 PID 2064 wrote to memory of 2244 2064 Security.exe 95 PID 2064 wrote to memory of 2244 2064 Security.exe 95 PID 2064 wrote to memory of 2244 2064 Security.exe 95 PID 2064 wrote to memory of 2244 2064 Security.exe 95 PID 2244 wrote to memory of 2352 2244 iexplore.exe 97 PID 2244 wrote to memory of 2352 2244 iexplore.exe 97 PID 2244 wrote to memory of 2352 2244 iexplore.exe 97 PID 2352 wrote to memory of 2284 2352 cmd.exe 99 PID 2352 wrote to memory of 2284 2352 cmd.exe 99 PID 2352 wrote to memory of 2284 2352 cmd.exe 99 PID 2244 wrote to memory of 3008 2244 iexplore.exe 100 PID 2244 wrote to memory of 3008 2244 iexplore.exe 100 PID 2244 wrote to memory of 3008 2244 iexplore.exe 100 PID 2244 wrote to memory of 3008 2244 iexplore.exe 100 PID 3968 wrote to memory of 2264 3968 cmd.exe 101 PID 3968 wrote to memory of 2264 3968 cmd.exe 101 PID 3968 wrote to memory of 2264 3968 cmd.exe 101 PID 2244 wrote to memory of 1548 2244 iexplore.exe 136 PID 2244 wrote to memory of 1548 2244 iexplore.exe 136 PID 2244 wrote to memory of 1548 2244 iexplore.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\luna.exe"C:\Users\Admin\AppData\Local\Temp\luna.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:216
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\system64\Security.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\system64\Security.exeC:\Windows\SysWOW64\system64\Security.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2264
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2284
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3008
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wuteiqkgrujkmfytxlzwjpudjqkkg.vbs"6⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524B
MD597627fc71d5e90498616baf1e6fd73f8
SHA1b75fdc55147ede7ba9eb9904d1b045246f5ba156
SHA256e1d0bd471d22160ca18c4f4e3fc727a4c66df66f9afb84816ba91e8fe201522f
SHA5128e41fd1ab5534213fe0921688d4adc72a2937765cfd7eb7bcb1448e5cc599cb705cba4415f2022d70f8b61d66b819e460cf7ba43a439a072a889f013c00ea948
-
Filesize
580B
MD543c21bcf73b5a6ac8b243377bfca1b70
SHA1a93c4253568fc1a4efa43f397e9af397198c50fc
SHA256cc42f66a6a29c515747ba232b697056f1a83aadde3977a0ff35a46c1bdc007a1
SHA512bab7a8bb3ac9ac8ce7f98842defa70fd86daca56291ca2696f66b29e33626626823aa3b527d3f7ae0cbbaac86edfab936e3acbead02e348ea46bd525a533ce10
-
Filesize
469KB
MD5e60cc75120901abeb61e9fb76cbf96ec
SHA1228bb950e891943002c0c7f604f3c3feff6d135b
SHA256ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
SHA5126de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41