Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-08-2021 09:44
Static task
static1
Behavioral task
behavioral1
Sample
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe
Resource
win7v20210408
General
-
Target
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe
-
Size
831KB
-
MD5
702502d248a49746461f351455ba910f
-
SHA1
0d380acae122897754a815d2fbf039a1832d5606
-
SHA256
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf
-
SHA512
6dbfb587d2936d853b93b0be99a6fc576908bea44a4bc0f73699189491294348597150e273d87c3ad7022d850bb2818e77d763ab34a6bbd36f42da0bed377460
Malware Config
Extracted
remcos
3.2.0 Pro
Sys32
135.181.140.182:4783
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Logs
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
SYS32-S57R8C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exedescription pid process target process PID 856 set thread context of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2144 856 WerFault.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe 2144 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exepid process 2220 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exeWerFault.exedescription pid process Token: SeDebugPrivilege 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe Token: SeRestorePrivilege 2144 WerFault.exe Token: SeBackupPrivilege 2144 WerFault.exe Token: SeDebugPrivilege 2144 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exepid process 2220 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exedescription pid process target process PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe PID 856 wrote to memory of 2220 856 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe 1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe"C:\Users\Admin\AppData\Local\Temp\1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe"C:\Users\Admin\AppData\Local\Temp\1270a5137d1c53725e34eac069b91436aef17863ec1102cc261cf214133444cf.bin.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 15922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/856-114-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/856-115-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/856-116-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/856-117-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/856-118-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/856-119-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/856-120-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/856-121-0x00000000050B0000-0x00000000055AE000-memory.dmpFilesize
5.0MB
-
memory/856-122-0x0000000006D70000-0x0000000006D71000-memory.dmpFilesize
4KB
-
memory/856-123-0x0000000006CB0000-0x0000000006D05000-memory.dmpFilesize
340KB
-
memory/856-124-0x0000000006D20000-0x0000000006D23000-memory.dmpFilesize
12KB
-
memory/2220-125-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2220-126-0x000000000042F76C-mapping.dmp
-
memory/2220-128-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB