Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe
Resource
win7-20240903-en
General
-
Target
5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe
-
Size
668KB
-
MD5
8aa1a76b4376bff1b15c61ac32356e3d
-
SHA1
166dd235cc46a451cfcf1a064ec57fc723487f54
-
SHA256
e727ed652a2b4da65d9a31ed081a59179d18a504cdfb52387e977a5c3689398d
-
SHA512
9d12f905afcf295bb818c7d78045b4b61c12c9e697b4b883d11367253da565a588396fb59c859c744c92f217f85b11e70c3475b7bc0ceda2317bc36219046bdc
-
SSDEEP
12288:a3aGraE/mdQVnY8AiThjQ5wBXIUo7oew04zsNijwh:Ob/m+VnFBdjQwI1iOh
Malware Config
Extracted
remcos
2.0.5 Pro
team33
wiskiriski15.duckdns.org:1626
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
csrss.exe
-
copy_folder
Microsoft
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
TKeSkxi-O6GOWP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
csrss
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 2612 csrss.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\SysWOW64\\Microsoft\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\SysWOW64\\Microsoft\\csrss.exe\"" 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\SysWOW64\\Microsoft\\csrss.exe\"" 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\SysWOW64\\Microsoft\\csrss.exe\"" csrss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft\csrss.exe 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe File opened for modification C:\Windows\SysWOW64\Microsoft\csrss.exe 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe File opened for modification C:\Windows\SysWOW64\Microsoft 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2888 reg.exe 1352 reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 2612 csrss.exe 2612 csrss.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 328 wrote to memory of 2264 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 31 PID 328 wrote to memory of 2264 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 31 PID 328 wrote to memory of 2264 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 31 PID 328 wrote to memory of 2264 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 31 PID 328 wrote to memory of 2824 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 33 PID 328 wrote to memory of 2824 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 33 PID 328 wrote to memory of 2824 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 33 PID 328 wrote to memory of 2824 328 5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe 33 PID 2264 wrote to memory of 2888 2264 cmd.exe 34 PID 2264 wrote to memory of 2888 2264 cmd.exe 34 PID 2264 wrote to memory of 2888 2264 cmd.exe 34 PID 2264 wrote to memory of 2888 2264 cmd.exe 34 PID 2824 wrote to memory of 2580 2824 WScript.exe 35 PID 2824 wrote to memory of 2580 2824 WScript.exe 35 PID 2824 wrote to memory of 2580 2824 WScript.exe 35 PID 2824 wrote to memory of 2580 2824 WScript.exe 35 PID 2580 wrote to memory of 2612 2580 cmd.exe 37 PID 2580 wrote to memory of 2612 2580 cmd.exe 37 PID 2580 wrote to memory of 2612 2580 cmd.exe 37 PID 2580 wrote to memory of 2612 2580 cmd.exe 37 PID 2612 wrote to memory of 1948 2612 csrss.exe 38 PID 2612 wrote to memory of 1948 2612 csrss.exe 38 PID 2612 wrote to memory of 1948 2612 csrss.exe 38 PID 2612 wrote to memory of 1948 2612 csrss.exe 38 PID 1948 wrote to memory of 1352 1948 cmd.exe 40 PID 1948 wrote to memory of 1352 1948 cmd.exe 40 PID 1948 wrote to memory of 1352 1948 cmd.exe 40 PID 1948 wrote to memory of 1352 1948 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe"C:\Users\Admin\AppData\Local\Temp\5498717122869040384804207296301042825657055179317810230152782008590075092500563444688795186316167466.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2888
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\Microsoft\csrss.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Microsoft\csrss.exeC:\Windows\SysWOW64\Microsoft\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1352
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400B
MD59c8579f9315e8e65b0ee4be56d256efb
SHA19c0f70021bb8b89a98c8a789ee891abcf83122a7
SHA256b68b386469bff1d8cf2e39d6c19860fffed2799e4ddf2cd50e74fcbf3d78549e
SHA5120d489992eafa651977dd31b966c9acfe8143af27ad944df72f9b7ce3f130072d5be4b994400f569188c89c3b3b2f0385e8aafb031fec7b2070d9f6f6d21ab452
-
Filesize
79B
MD5deda203bbc7b55e0cda4311d03ba80f2
SHA17f65126aa8d667804b01064318ab9be3b1277bf1
SHA2561877cb252f85ec7f085108281c52ac77b7c824fd5e9c28c7de41f001cd2fddc5
SHA5122bb53a533c30a2764e1b489096deaae8669e36d62ce75f4166fed3a47a3658c0f7b2a5dfbb7ad0c6737a2e5867648cad16279f1ff97ffcd2afcf19d696b9ee7a
-
Filesize
668KB
MD58aa1a76b4376bff1b15c61ac32356e3d
SHA1166dd235cc46a451cfcf1a064ec57fc723487f54
SHA256e727ed652a2b4da65d9a31ed081a59179d18a504cdfb52387e977a5c3689398d
SHA5129d12f905afcf295bb818c7d78045b4b61c12c9e697b4b883d11367253da565a588396fb59c859c744c92f217f85b11e70c3475b7bc0ceda2317bc36219046bdc