Analysis
-
max time kernel
149s -
max time network
186s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-07-2021 09:06
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Document.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
Shipping_Document.exe
-
Size
736KB
-
MD5
8809c7cab903669b1da338f39327a7c3
-
SHA1
7b19e931f2ab478e1189431a216f1cc2c9b43d8d
-
SHA256
86fffe8373d8bbcc79e4105465a3775bb9a2b4d35fb47961ab6173558bfeda14
-
SHA512
33bfbfd4729fb6ed94e27f323c668c92e7c1394e4628e236e16fff0bee0df0644ca29e666679e7a8b92cf077267aeff43bbf5c35e57d68ee80d11956cb246cac
Malware Config
Extracted
Family
remcos
Botnet
Young
C2
june248.ddns.net:3759
Attributes
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-4GJ3Q1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Shipping_Document.exedescription pid process target process PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe PID 2004 wrote to memory of 572 2004 Shipping_Document.exe mobsync.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/572-61-0x0000000000000000-mapping.dmp
-
memory/572-63-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/572-65-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/572-64-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/572-66-0x0000000010590000-0x000000001060D000-memory.dmpFilesize
500KB
-
memory/572-67-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/2004-59-0x00000000754F1000-0x00000000754F3000-memory.dmpFilesize
8KB
-
memory/2004-60-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB