Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe
Resource
win10v2004-20220812-en
General
-
Target
1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe
-
Size
74KB
-
MD5
45f5f116b2d8a8e00998fc1e9e4529d4
-
SHA1
4e95847d642c24529258567302eadd270e4c0294
-
SHA256
1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633
-
SHA512
5612e9ae0774a031edb1f6018df5c76b97e6cc8587bc4580994dc022a4675782b55931d45ef8072ba2f72d7106ef0af4acf1f8d85054eb6789a411d8004a6de0
-
SSDEEP
768:EGO5dN2mDSU2Ip4jBqltCF0AxEjenoB69+Fxt:vO55SFHBWAxEjc+V
Malware Config
Extracted
remcos
RemoteHost
185.146.88.243:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-41DY3B
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79 PID 2280 wrote to memory of 452 2280 1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe"C:\Users\Admin\AppData\Local\Temp\1cfede541f45c372c43c2e9667323c6d7621b3f13d20ae7be93574a30a7c0633.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\SysWOW64\mspaint.exe"2⤵PID:452
-