Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 03:54
Behavioral task
behavioral1
Sample
luna.exe
Resource
win10v2004-20241007-en
General
-
Target
luna.exe
-
Size
469KB
-
MD5
e60cc75120901abeb61e9fb76cbf96ec
-
SHA1
228bb950e891943002c0c7f604f3c3feff6d135b
-
SHA256
ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
-
SHA512
6de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSdPn9:uiLJbpI7I2WhQqZ7dP9
Malware Config
Extracted
remcos
RemoteHost
it-double.gl.at.ply.gg:37981
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Security.exe
-
copy_folder
system64
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z7BY2N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Windows Recovery
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation luna.exe -
Deletes itself 1 IoCs
pid Process 2136 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 Security.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" luna.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Recovery = "\"C:\\Windows\\SysWOW64\\system64\\Security.exe\"" Security.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\system64\Security.exe luna.exe File opened for modification C:\Windows\SysWOW64\system64\Security.exe luna.exe File opened for modification C:\Windows\SysWOW64\system64 luna.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2892 set thread context of 4756 2892 Security.exe 94 PID 4756 set thread context of 2160 4756 iexplore.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings luna.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1220 reg.exe 4656 reg.exe 2808 reg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2892 Security.exe 4756 iexplore.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3232 wrote to memory of 4020 3232 luna.exe 83 PID 3232 wrote to memory of 4020 3232 luna.exe 83 PID 3232 wrote to memory of 4020 3232 luna.exe 83 PID 4020 wrote to memory of 4656 4020 cmd.exe 85 PID 4020 wrote to memory of 4656 4020 cmd.exe 85 PID 4020 wrote to memory of 4656 4020 cmd.exe 85 PID 3232 wrote to memory of 2136 3232 luna.exe 86 PID 3232 wrote to memory of 2136 3232 luna.exe 86 PID 3232 wrote to memory of 2136 3232 luna.exe 86 PID 2136 wrote to memory of 3724 2136 WScript.exe 90 PID 2136 wrote to memory of 3724 2136 WScript.exe 90 PID 2136 wrote to memory of 3724 2136 WScript.exe 90 PID 3724 wrote to memory of 2892 3724 cmd.exe 92 PID 3724 wrote to memory of 2892 3724 cmd.exe 92 PID 3724 wrote to memory of 2892 3724 cmd.exe 92 PID 2892 wrote to memory of 5076 2892 Security.exe 93 PID 2892 wrote to memory of 5076 2892 Security.exe 93 PID 2892 wrote to memory of 5076 2892 Security.exe 93 PID 2892 wrote to memory of 4756 2892 Security.exe 94 PID 2892 wrote to memory of 4756 2892 Security.exe 94 PID 2892 wrote to memory of 4756 2892 Security.exe 94 PID 2892 wrote to memory of 4756 2892 Security.exe 94 PID 4756 wrote to memory of 1176 4756 iexplore.exe 96 PID 4756 wrote to memory of 1176 4756 iexplore.exe 96 PID 4756 wrote to memory of 1176 4756 iexplore.exe 96 PID 4756 wrote to memory of 2160 4756 iexplore.exe 97 PID 4756 wrote to memory of 2160 4756 iexplore.exe 97 PID 4756 wrote to memory of 2160 4756 iexplore.exe 97 PID 4756 wrote to memory of 2160 4756 iexplore.exe 97 PID 5076 wrote to memory of 2808 5076 cmd.exe 99 PID 5076 wrote to memory of 2808 5076 cmd.exe 99 PID 5076 wrote to memory of 2808 5076 cmd.exe 99 PID 1176 wrote to memory of 1220 1176 cmd.exe 100 PID 1176 wrote to memory of 1220 1176 cmd.exe 100 PID 1176 wrote to memory of 1220 1176 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\luna.exe"C:\Users\Admin\AppData\Local\Temp\luna.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4656
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\system64\Security.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\system64\Security.exeC:\Windows\SysWOW64\system64\Security.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2808
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1220
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2160
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524B
MD597627fc71d5e90498616baf1e6fd73f8
SHA1b75fdc55147ede7ba9eb9904d1b045246f5ba156
SHA256e1d0bd471d22160ca18c4f4e3fc727a4c66df66f9afb84816ba91e8fe201522f
SHA5128e41fd1ab5534213fe0921688d4adc72a2937765cfd7eb7bcb1448e5cc599cb705cba4415f2022d70f8b61d66b819e460cf7ba43a439a072a889f013c00ea948
-
Filesize
469KB
MD5e60cc75120901abeb61e9fb76cbf96ec
SHA1228bb950e891943002c0c7f604f3c3feff6d135b
SHA256ecfa5c1f460a2d96cfe17c13b7b77f1755ebf4a96d114a1d8814d85c78483ade
SHA5126de5b0985238ba664985f5b0371765ecf8e6a31bafd5dd3688fefeb0c93cdfe011adc4aefa2258afacb6278e5f83199c96c1247671adc3e319ba45150c787b41