Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 20:57
Behavioral task
behavioral1
Sample
luna.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
luna.exe
Resource
win10v2004-20241007-en
General
-
Target
luna.exe
-
Size
469KB
-
MD5
e60cc75120901abeb61e9fb76cbf96ec
-
SHA1
228bb950e891943002c0c7f604f3c3feff6d135b
-
SHA256
ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
-
SHA512
6de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSdPn9:uiLJbpI7I2WhQqZ7dP9
Malware Config
Extracted
remcos
RemoteHost
it-double.gl.at.ply.gg:37981
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Security.exe
-
copy_folder
system64
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z7BY2N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Windows Recovery
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe -
Deletes itself 1 IoCs
pid Process 1624 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 Security.exe -
Loads dropped DLL 2 IoCs
pid Process 704 cmd.exe 704 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system64 luna.exe File created C:\Windows\SysWOW64\system64\Security.exe luna.exe File opened for modification C:\Windows\SysWOW64\system64\Security.exe luna.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2852 set thread context of 2928 2852 Security.exe 37 PID 2928 set thread context of 2908 2928 iexplore.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 2156 reg.exe 3004 reg.exe 2780 reg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2852 Security.exe 2928 iexplore.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2616 2384 luna.exe 29 PID 2384 wrote to memory of 2616 2384 luna.exe 29 PID 2384 wrote to memory of 2616 2384 luna.exe 29 PID 2384 wrote to memory of 2616 2384 luna.exe 29 PID 2616 wrote to memory of 2156 2616 cmd.exe 32 PID 2616 wrote to memory of 2156 2616 cmd.exe 32 PID 2616 wrote to memory of 2156 2616 cmd.exe 32 PID 2616 wrote to memory of 2156 2616 cmd.exe 32 PID 2384 wrote to memory of 1624 2384 luna.exe 31 PID 2384 wrote to memory of 1624 2384 luna.exe 31 PID 2384 wrote to memory of 1624 2384 luna.exe 31 PID 2384 wrote to memory of 1624 2384 luna.exe 31 PID 1624 wrote to memory of 704 1624 WScript.exe 33 PID 1624 wrote to memory of 704 1624 WScript.exe 33 PID 1624 wrote to memory of 704 1624 WScript.exe 33 PID 1624 wrote to memory of 704 1624 WScript.exe 33 PID 704 wrote to memory of 2852 704 cmd.exe 35 PID 704 wrote to memory of 2852 704 cmd.exe 35 PID 704 wrote to memory of 2852 704 cmd.exe 35 PID 704 wrote to memory of 2852 704 cmd.exe 35 PID 2852 wrote to memory of 2876 2852 Security.exe 36 PID 2852 wrote to memory of 2876 2852 Security.exe 36 PID 2852 wrote to memory of 2876 2852 Security.exe 36 PID 2852 wrote to memory of 2876 2852 Security.exe 36 PID 2852 wrote to memory of 2928 2852 Security.exe 37 PID 2852 wrote to memory of 2928 2852 Security.exe 37 PID 2852 wrote to memory of 2928 2852 Security.exe 37 PID 2852 wrote to memory of 2928 2852 Security.exe 37 PID 2852 wrote to memory of 2928 2852 Security.exe 37 PID 2928 wrote to memory of 3024 2928 iexplore.exe 39 PID 2928 wrote to memory of 3024 2928 iexplore.exe 39 PID 2928 wrote to memory of 3024 2928 iexplore.exe 39 PID 2928 wrote to memory of 3024 2928 iexplore.exe 39 PID 2876 wrote to memory of 3004 2876 cmd.exe 41 PID 2876 wrote to memory of 3004 2876 cmd.exe 41 PID 2876 wrote to memory of 3004 2876 cmd.exe 41 PID 2876 wrote to memory of 3004 2876 cmd.exe 41 PID 3024 wrote to memory of 2780 3024 cmd.exe 42 PID 3024 wrote to memory of 2780 3024 cmd.exe 42 PID 3024 wrote to memory of 2780 3024 cmd.exe 42 PID 3024 wrote to memory of 2780 3024 cmd.exe 42 PID 2928 wrote to memory of 2908 2928 iexplore.exe 43 PID 2928 wrote to memory of 2908 2928 iexplore.exe 43 PID 2928 wrote to memory of 2908 2928 iexplore.exe 43 PID 2928 wrote to memory of 2908 2928 iexplore.exe 43 PID 2928 wrote to memory of 2908 2928 iexplore.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\luna.exe"C:\Users\Admin\AppData\Local\Temp\luna.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2156
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\system64\Security.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\system64\Security.exeC:\Windows\SysWOW64\system64\Security.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3004
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2780
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2908
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524B
MD597627fc71d5e90498616baf1e6fd73f8
SHA1b75fdc55147ede7ba9eb9904d1b045246f5ba156
SHA256e1d0bd471d22160ca18c4f4e3fc727a4c66df66f9afb84816ba91e8fe201522f
SHA5128e41fd1ab5534213fe0921688d4adc72a2937765cfd7eb7bcb1448e5cc599cb705cba4415f2022d70f8b61d66b819e460cf7ba43a439a072a889f013c00ea948
-
Filesize
469KB
MD5e60cc75120901abeb61e9fb76cbf96ec
SHA1228bb950e891943002c0c7f604f3c3feff6d135b
SHA256ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
SHA5126de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41