Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Tredjelandes.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tredjelandes.ps1
Resource
win10v2004-20241007-en
General
-
Target
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe
-
Size
512KB
-
MD5
053184cbad166da8d6065e1fb934b964
-
SHA1
54fa68f4233ab168238ea71af23eec2436552a0b
-
SHA256
c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54
-
SHA512
b6402e9b634cee834db92edfe02f39a77fecfef3ff2836605c2f1276424287e5559a34306a4d376ea999fe0850c27c45d3d16ce00a91d9a65f27ba04c3d6ea69
-
SSDEEP
12288:1BRxKL/cM4jJL3O80+E3DzGpiOZWWiawo9fv6MIfGYfmBBWMM:JwLkPjJLO6pilWva/fPmo
Malware Config
Extracted
remcos
WOW
eweo9264gtuiorta1.duckdns.org:2879
eweo9264gtuiorta1.duckdns.org:2889
surit2948estoat02.duckdns.org:2879
lafours8tursot2.duckdns.org:2879
lafours8tursot3.duckdns.org:2879
lafours8tursot4.duckdns.org:2879
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hajoest.dat
-
keylog_flag
false
-
mouse_option
false
-
mutex
fsgthdjtru-5Y7T6I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2344 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Overraekkelsen73 = "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\\Software\\storkors\\').Angili;%Indstraaling164% ($Prioristic54)" reg.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 33 4996 msiexec.exe 35 4996 msiexec.exe 37 4996 msiexec.exe 39 4996 msiexec.exe 45 4996 msiexec.exe 49 4996 msiexec.exe 51 4996 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 drive.google.com 33 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4996 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2344 powershell.exe 4996 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\resources\figursyedes.lnk c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3952 reg.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2344 powershell.exe Token: SeIncreaseQuotaPrivilege 2344 powershell.exe Token: SeSecurityPrivilege 2344 powershell.exe Token: SeTakeOwnershipPrivilege 2344 powershell.exe Token: SeLoadDriverPrivilege 2344 powershell.exe Token: SeSystemProfilePrivilege 2344 powershell.exe Token: SeSystemtimePrivilege 2344 powershell.exe Token: SeProfSingleProcessPrivilege 2344 powershell.exe Token: SeIncBasePriorityPrivilege 2344 powershell.exe Token: SeCreatePagefilePrivilege 2344 powershell.exe Token: SeBackupPrivilege 2344 powershell.exe Token: SeRestorePrivilege 2344 powershell.exe Token: SeShutdownPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeSystemEnvironmentPrivilege 2344 powershell.exe Token: SeRemoteShutdownPrivilege 2344 powershell.exe Token: SeUndockPrivilege 2344 powershell.exe Token: SeManageVolumePrivilege 2344 powershell.exe Token: 33 2344 powershell.exe Token: 34 2344 powershell.exe Token: 35 2344 powershell.exe Token: 36 2344 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2344 4736 c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe 82 PID 4736 wrote to memory of 2344 4736 c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe 82 PID 4736 wrote to memory of 2344 4736 c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe 82 PID 2344 wrote to memory of 4996 2344 powershell.exe 91 PID 2344 wrote to memory of 4996 2344 powershell.exe 91 PID 2344 wrote to memory of 4996 2344 powershell.exe 91 PID 2344 wrote to memory of 4996 2344 powershell.exe 91 PID 4996 wrote to memory of 1324 4996 msiexec.exe 93 PID 4996 wrote to memory of 1324 4996 msiexec.exe 93 PID 4996 wrote to memory of 1324 4996 msiexec.exe 93 PID 1324 wrote to memory of 3952 1324 cmd.exe 95 PID 1324 wrote to memory of 3952 1324 cmd.exe 95 PID 1324 wrote to memory of 3952 1324 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe"C:\Users\Admin\AppData\Local\Temp\c877c021f20392b5c63533b4e59522f17d060d20341a47c76f24b7430c72ad54.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Effeminacies=Get-Content -raw 'C:\Users\Admin\AppData\Local\parkeringsforholdet\Irrational\Tredjelandes.Sel';$Gizeh4=$Effeminacies.SubString(2147,3);.$Gizeh4($Effeminacies)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Overraekkelsen73" /t REG_EXPAND_SZ /d "%Indstraaling164% -windowstyle 1 $Prioristic54=(gp -Path 'HKCU:\Software\storkors\').Angili;%Indstraaling164% ($Prioristic54)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3952
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
287KB
MD5f20bfd077f96d3b5f57cce52c6fa8ebe
SHA1b2bc4ec3384f6402687deb55c73c8bb904f8b7c4
SHA256c96b45939261aae0e7b2f439ff96ea7f8a188ceb9f8528cb3d274419cc7dfc91
SHA512a836d407668a815f890494d89d9a4d5bfc01896799a185471fb2939028955c61e03c932acc06af3418540ccd2521f160769d29ec5aea96c1b61e5164d9f47c59
-
Filesize
52KB
MD585edb7354ba656bbb556d21c8e68831c
SHA1e01c029026be5e5d7e17cdd191360d9bbd9d9e27
SHA256d9b3298dafafc8f85e167c0c739d94cf6671f017e1a0cf7e759ff6158b5921ed
SHA512b86b8ee9f4f0f0421074de62c439ef5cf63b441f44b95c9a1ca28b357c9fd52c85ba00af70e975f4e5aa4601829026ee2ebec143fb9357815e76635fdf3a28d5