Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
3b72f732f216136775f6aebdbda1ba0b.exe
Resource
win7-20240729-en
General
-
Target
3b72f732f216136775f6aebdbda1ba0b.exe
-
Size
677KB
-
MD5
3b72f732f216136775f6aebdbda1ba0b
-
SHA1
f64deba6e108c2690a1f10ac0cd1a530cf3d16f8
-
SHA256
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241
-
SHA512
8df9b062f2d82724fe186d18f30f2896eb93a591a38d5be33fcfb922722864c9f2b8a9324457b4eb41be1c08a546cd16b8319a0bfe41c81b1c0101f182804945
-
SSDEEP
12288:g+/D317UULVEwJP85xXtN1TrlHoACk9tclfmD/Q+6YTWiEOcW7scrzk:7DxUbXH1VIk+ubQ+DP8W77Pk
Malware Config
Extracted
remcos
Fresh
lafours8tursot1.duckdns.org:2879
lafours8tursot1.duckdns.org:2889
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
ioeoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
iomdjtru-ZWTOJI
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Troolie = "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\\Software\\Biledes\\').Scripturalizes;%Sanguivorous% ($Heptacolic)" reg.exe -
Blocklisted process makes network request 9 IoCs
flow pid Process 33 536 msiexec.exe 35 536 msiexec.exe 37 536 msiexec.exe 39 536 msiexec.exe 41 536 msiexec.exe 46 536 msiexec.exe 47 536 msiexec.exe 49 536 msiexec.exe 51 536 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 drive.google.com 33 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 536 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4812 Powershell.exe 536 msiexec.exe -
pid Process 4812 Powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b72f732f216136775f6aebdbda1ba0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4416 reg.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4812 Powershell.exe 4812 Powershell.exe 4812 Powershell.exe 4812 Powershell.exe 4812 Powershell.exe 4812 Powershell.exe 4812 Powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4812 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4812 Powershell.exe Token: SeIncreaseQuotaPrivilege 4812 Powershell.exe Token: SeSecurityPrivilege 4812 Powershell.exe Token: SeTakeOwnershipPrivilege 4812 Powershell.exe Token: SeLoadDriverPrivilege 4812 Powershell.exe Token: SeSystemProfilePrivilege 4812 Powershell.exe Token: SeSystemtimePrivilege 4812 Powershell.exe Token: SeProfSingleProcessPrivilege 4812 Powershell.exe Token: SeIncBasePriorityPrivilege 4812 Powershell.exe Token: SeCreatePagefilePrivilege 4812 Powershell.exe Token: SeBackupPrivilege 4812 Powershell.exe Token: SeRestorePrivilege 4812 Powershell.exe Token: SeShutdownPrivilege 4812 Powershell.exe Token: SeDebugPrivilege 4812 Powershell.exe Token: SeSystemEnvironmentPrivilege 4812 Powershell.exe Token: SeRemoteShutdownPrivilege 4812 Powershell.exe Token: SeUndockPrivilege 4812 Powershell.exe Token: SeManageVolumePrivilege 4812 Powershell.exe Token: 33 4812 Powershell.exe Token: 34 4812 Powershell.exe Token: 35 4812 Powershell.exe Token: 36 4812 Powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 536 msiexec.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4812 1800 3b72f732f216136775f6aebdbda1ba0b.exe 86 PID 1800 wrote to memory of 4812 1800 3b72f732f216136775f6aebdbda1ba0b.exe 86 PID 1800 wrote to memory of 4812 1800 3b72f732f216136775f6aebdbda1ba0b.exe 86 PID 4812 wrote to memory of 536 4812 Powershell.exe 97 PID 4812 wrote to memory of 536 4812 Powershell.exe 97 PID 4812 wrote to memory of 536 4812 Powershell.exe 97 PID 4812 wrote to memory of 536 4812 Powershell.exe 97 PID 536 wrote to memory of 4428 536 msiexec.exe 101 PID 536 wrote to memory of 4428 536 msiexec.exe 101 PID 536 wrote to memory of 4428 536 msiexec.exe 101 PID 4428 wrote to memory of 4416 4428 cmd.exe 104 PID 4428 wrote to memory of 4416 4428 cmd.exe 104 PID 4428 wrote to memory of 4416 4428 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b72f732f216136775f6aebdbda1ba0b.exe"C:\Users\Admin\AppData\Local\Temp\3b72f732f216136775f6aebdbda1ba0b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -windowstyle minimized "$Zieglers = Get-Content -raw 'C:\Users\Admin\AppData\Roaming\Lysninger28\grdesanger\Hjlpemenuen104.Gen192' ; $Bibbling=$Zieglers.SubString(77179,3);.$Bibbling($Zieglers)2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Troolie" /t REG_EXPAND_SZ /d "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\Software\Biledes\').Scripturalizes;%Sanguivorous% ($Heptacolic)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Troolie" /t REG_EXPAND_SZ /d "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\Software\Biledes\').Scripturalizes;%Sanguivorous% ($Heptacolic)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4416
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
423KB
MD51b559621122c1b9255e77e86c8fbe290
SHA11a803f1663eb48db7aedc8606feb64cca0928132
SHA25630edde04845cf5971cd2acae8685ca9513ee34595ded8a566c37c7f87ba34614
SHA5124b321218f3c3487992d6a2e50b69d5cdd248a43e89ca12366f962493a547699c7564e57a67ca4aacb588bf38d98a5152b2d20d122f9616319c71838a98fd078f
-
Filesize
75KB
MD5320c79f6479491da5f91192e301648f6
SHA148664b2465180bbd3c4d3e92abeb5bcd3cc29bfd
SHA25657f6b2ee227e10b1fae852528583fa97c9af97ccc7bc4f93fdda7aa4f8ca127d
SHA512c5403831808634c94bae13a21397dd42a8dfbf24d4272684afb1c49f90b888312f01f1efde32b2a4e0424ce6d76249e3be85c9e5baa02ea06fd3bebc31c4434f