Analysis
-
max time kernel
17s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
nursultan_alpha.exe
Resource
win10v2004-20241007-en
General
-
Target
nursultan_alpha.exe
-
Size
213KB
-
MD5
2ce2e55b2b14a7191fc4fb3afe5b111b
-
SHA1
2823a92731885550f3ef3592e6cd3a9d8dd463c9
-
SHA256
2117a2ed185e31ac5ecd7c624aba8790ac58b1a19922ebc8e1f9d98b272c8557
-
SHA512
f9bb14f35e35d320745e0d8e18a102b777945fe42da9e041f0afb4c3882d3be93ccd402d9461150a0d8d21a15e80b5aeccfbdb0c8f9c69fc24f234158c82990a
-
SSDEEP
3072:/yD6vMr7B1bXOgy+Peamb+IutMR8rNaH19lv3+BSydcqgOgpzm2vi75ifDzVIII:qxcmmbutMbH19l0SyePpzfW5if
Malware Config
Extracted
remcos
svchost.exe
schedule-lambda.gl.at.ply.gg:52195
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
svchost.exe
-
copy_folder
svchost
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-T8EQ04
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Microsoft Systems inc.
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exenursultan_alpha.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run nursultan_alpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" nursultan_alpha.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nursultan_alpha.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation nursultan_alpha.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 3300 WScript.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2952 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
nursultan_alpha.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" nursultan_alpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" nursultan_alpha.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Systems inc. = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost\\svchost.exe\"" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2952 set thread context of 1700 2952 svchost.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.exenursultan_alpha.execmd.exereg.exeWScript.execmd.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nursultan_alpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
Processes:
nursultan_alpha.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings nursultan_alpha.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exepid process 2952 svchost.exe 2952 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
svchost.exepid process 2952 svchost.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
nursultan_alpha.execmd.exeWScript.execmd.exesvchost.execmd.exedescription pid process target process PID 2740 wrote to memory of 3420 2740 nursultan_alpha.exe cmd.exe PID 2740 wrote to memory of 3420 2740 nursultan_alpha.exe cmd.exe PID 2740 wrote to memory of 3420 2740 nursultan_alpha.exe cmd.exe PID 3420 wrote to memory of 3608 3420 cmd.exe reg.exe PID 3420 wrote to memory of 3608 3420 cmd.exe reg.exe PID 3420 wrote to memory of 3608 3420 cmd.exe reg.exe PID 2740 wrote to memory of 3300 2740 nursultan_alpha.exe WScript.exe PID 2740 wrote to memory of 3300 2740 nursultan_alpha.exe WScript.exe PID 2740 wrote to memory of 3300 2740 nursultan_alpha.exe WScript.exe PID 3300 wrote to memory of 3768 3300 WScript.exe cmd.exe PID 3300 wrote to memory of 3768 3300 WScript.exe cmd.exe PID 3300 wrote to memory of 3768 3300 WScript.exe cmd.exe PID 3768 wrote to memory of 2952 3768 cmd.exe svchost.exe PID 3768 wrote to memory of 2952 3768 cmd.exe svchost.exe PID 3768 wrote to memory of 2952 3768 cmd.exe svchost.exe PID 2952 wrote to memory of 2676 2952 svchost.exe cmd.exe PID 2952 wrote to memory of 2676 2952 svchost.exe cmd.exe PID 2952 wrote to memory of 2676 2952 svchost.exe cmd.exe PID 2952 wrote to memory of 1700 2952 svchost.exe iexplore.exe PID 2952 wrote to memory of 1700 2952 svchost.exe iexplore.exe PID 2952 wrote to memory of 1700 2952 svchost.exe iexplore.exe PID 2952 wrote to memory of 1700 2952 svchost.exe iexplore.exe PID 2676 wrote to memory of 4916 2676 cmd.exe reg.exe PID 2676 wrote to memory of 4916 2676 cmd.exe reg.exe PID 2676 wrote to memory of 4916 2676 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nursultan_alpha.exe"C:\Users\Admin\AppData\Local\Temp\nursultan_alpha.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3608
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Roaming\svchost\svchost.exeC:\Users\Admin\AppData\Roaming\svchost\svchost.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4916
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵PID:1700
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564B
MD5cbd62b79334649b88bcf154ade604d4b
SHA18fa3d6a912ecfecc31ad8c472d791436d8835668
SHA2561cdc85bf1fc49c2eeea23a69a5af61fb1f8766dadd3b967cdca9dbbc77d14436
SHA512182109b4adfbc9ea87bfb6510b9f3148d05c41e9f07312a90ebe485b0fa3932b810c19e4b39cbd6c73b4cbb237ddf6aede32f030f378ef08cf67a6d80c3b2ab9
-
Filesize
213KB
MD52ce2e55b2b14a7191fc4fb3afe5b111b
SHA12823a92731885550f3ef3592e6cd3a9d8dd463c9
SHA2562117a2ed185e31ac5ecd7c624aba8790ac58b1a19922ebc8e1f9d98b272c8557
SHA512f9bb14f35e35d320745e0d8e18a102b777945fe42da9e041f0afb4c3882d3be93ccd402d9461150a0d8d21a15e80b5aeccfbdb0c8f9c69fc24f234158c82990a