Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
03-12-2021 13:19
Behavioral task
behavioral1
Sample
tmp/4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe
Resource
win7-en-20211104
0 signatures
0 seconds
General
-
Target
tmp/4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe
-
Size
463KB
-
MD5
a603a8a69bbcd08f4899a605ab1c68e4
-
SHA1
59f7a2f88a8a3fc13f685672b72506b28ba1614e
-
SHA256
4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81
-
SHA512
367238cbdaadbfbe42e08da5596f44efb00844505b7a415a57fd3a2d969b8ca83ac4b6ab3c0a4f6c348d9fec0229baee760bb0798768325710a7e70a3f8a4612
Malware Config
Extracted
Family
remcos
Version
3.3.2 Pro
Botnet
remrem102
C2
18.218.132.40:2404
Attributes
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
jre
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-QIKEGJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 852 set thread context of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1440 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 852 wrote to memory of 336 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 28 PID 852 wrote to memory of 336 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 28 PID 852 wrote to memory of 336 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 28 PID 852 wrote to memory of 336 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 28 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 336 wrote to memory of 1440 336 cmd.exe 31 PID 336 wrote to memory of 1440 336 cmd.exe 31 PID 336 wrote to memory of 1440 336 cmd.exe 31 PID 336 wrote to memory of 1440 336 cmd.exe 31 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30 PID 852 wrote to memory of 1576 852 4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp\4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe"C:\Users\Admin\AppData\Local\Temp\tmp\4a843bea699f8a40ae3b92c04e01139d61880ce1c519e369a966e814593d1d81.dll.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1440
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe2⤵PID:1576
-