Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-01-2023 23:03
Static task
static1
Behavioral task
behavioral1
Sample
38dce98044e8afcadf97c744b6127609.exe
Resource
win7-20220901-en
General
-
Target
38dce98044e8afcadf97c744b6127609.exe
-
Size
300.0MB
-
MD5
38dce98044e8afcadf97c744b6127609
-
SHA1
ad0abc09ebac76f306973a57bd7599987d981c9a
-
SHA256
ecc8200db1559efbe4adbc6fd105b7864fada00f4f44f70906668ec3fe211d94
-
SHA512
1e19088624a7335bcfcda4f2968510a9440fdc72f850e5be87b8d825029fb52a01cd2a060c07c4fd552557c80306a970bf780155f95bbdf2a5dd9bba19951888
-
SSDEEP
12288:+p0n7snoXb6hFgo2XHlpHj06cQ0G1Rgu0kG9D59+gv2+T7Jw1954xh:++n7soe7gbHrHj040G1b059N
Malware Config
Extracted
remcos
LUNES
sdkvifernuebvhcdbv.con-ip.com:1883
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ACPSDP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
solve.exesolve.exepid process 432 solve.exe 1688 solve.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
38dce98044e8afcadf97c744b6127609.exesolve.exesolve.exedescription pid process target process PID 944 set thread context of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 432 set thread context of 1628 432 solve.exe csc.exe PID 1688 set thread context of 992 1688 solve.exe csc.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1528 schtasks.exe 560 schtasks.exe 840 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csc.exepid process 644 csc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
38dce98044e8afcadf97c744b6127609.execmd.exetaskeng.exesolve.execmd.exedescription pid process target process PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 644 944 38dce98044e8afcadf97c744b6127609.exe csc.exe PID 944 wrote to memory of 1356 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 1356 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 1356 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 1356 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 336 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 336 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 336 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 336 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 2044 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 2044 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 2044 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 944 wrote to memory of 2044 944 38dce98044e8afcadf97c744b6127609.exe cmd.exe PID 336 wrote to memory of 1528 336 cmd.exe schtasks.exe PID 336 wrote to memory of 1528 336 cmd.exe schtasks.exe PID 336 wrote to memory of 1528 336 cmd.exe schtasks.exe PID 336 wrote to memory of 1528 336 cmd.exe schtasks.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 1056 wrote to memory of 432 1056 taskeng.exe solve.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 1628 432 solve.exe csc.exe PID 432 wrote to memory of 892 432 solve.exe cmd.exe PID 432 wrote to memory of 892 432 solve.exe cmd.exe PID 432 wrote to memory of 892 432 solve.exe cmd.exe PID 432 wrote to memory of 892 432 solve.exe cmd.exe PID 432 wrote to memory of 1960 432 solve.exe cmd.exe PID 432 wrote to memory of 1960 432 solve.exe cmd.exe PID 432 wrote to memory of 1960 432 solve.exe cmd.exe PID 432 wrote to memory of 1960 432 solve.exe cmd.exe PID 1960 wrote to memory of 560 1960 cmd.exe schtasks.exe PID 1960 wrote to memory of 560 1960 cmd.exe schtasks.exe PID 1960 wrote to memory of 560 1960 cmd.exe schtasks.exe PID 1960 wrote to memory of 560 1960 cmd.exe schtasks.exe PID 432 wrote to memory of 456 432 solve.exe cmd.exe PID 432 wrote to memory of 456 432 solve.exe cmd.exe PID 432 wrote to memory of 456 432 solve.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38dce98044e8afcadf97c744b6127609.exe"C:\Users\Admin\AppData\Local\Temp\38dce98044e8afcadf97c744b6127609.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\solve"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\38dce98044e8afcadf97c744b6127609.exe" "C:\Users\Admin\AppData\Roaming\solve\solve.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {9406DAC1-8804-4CE2-8E5D-AF028E38BF7B} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\solve\solve.exeC:\Users\Admin\AppData\Roaming\solve\solve.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\solve"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\solve\solve.exe" "C:\Users\Admin\AppData\Roaming\solve\solve.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\solve\solve.exeC:\Users\Admin\AppData\Roaming\solve\solve.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\solve"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\solve\solve.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\solve\solve.exe" "C:\Users\Admin\AppData\Roaming\solve\solve.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\solve\solve.exeFilesize
300.0MB
MD538dce98044e8afcadf97c744b6127609
SHA1ad0abc09ebac76f306973a57bd7599987d981c9a
SHA256ecc8200db1559efbe4adbc6fd105b7864fada00f4f44f70906668ec3fe211d94
SHA5121e19088624a7335bcfcda4f2968510a9440fdc72f850e5be87b8d825029fb52a01cd2a060c07c4fd552557c80306a970bf780155f95bbdf2a5dd9bba19951888
-
C:\Users\Admin\AppData\Roaming\solve\solve.exeFilesize
300.0MB
MD538dce98044e8afcadf97c744b6127609
SHA1ad0abc09ebac76f306973a57bd7599987d981c9a
SHA256ecc8200db1559efbe4adbc6fd105b7864fada00f4f44f70906668ec3fe211d94
SHA5121e19088624a7335bcfcda4f2968510a9440fdc72f850e5be87b8d825029fb52a01cd2a060c07c4fd552557c80306a970bf780155f95bbdf2a5dd9bba19951888
-
C:\Users\Admin\AppData\Roaming\solve\solve.exeFilesize
300.0MB
MD538dce98044e8afcadf97c744b6127609
SHA1ad0abc09ebac76f306973a57bd7599987d981c9a
SHA256ecc8200db1559efbe4adbc6fd105b7864fada00f4f44f70906668ec3fe211d94
SHA5121e19088624a7335bcfcda4f2968510a9440fdc72f850e5be87b8d825029fb52a01cd2a060c07c4fd552557c80306a970bf780155f95bbdf2a5dd9bba19951888
-
memory/336-83-0x0000000000000000-mapping.dmp
-
memory/432-89-0x0000000001290000-0x000000000134E000-memory.dmpFilesize
760KB
-
memory/432-87-0x0000000000000000-mapping.dmp
-
memory/456-120-0x0000000000000000-mapping.dmp
-
memory/560-119-0x0000000000000000-mapping.dmp
-
memory/644-56-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-61-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-75-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-69-0x0000000000432C26-mapping.dmp
-
memory/644-70-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-81-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-63-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-62-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-57-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-66-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-59-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/644-64-0x00000000000D0000-0x000000000014F000-memory.dmpFilesize
508KB
-
memory/740-151-0x0000000000000000-mapping.dmp
-
memory/840-152-0x0000000000000000-mapping.dmp
-
memory/884-149-0x0000000000000000-mapping.dmp
-
memory/892-106-0x0000000000000000-mapping.dmp
-
memory/944-55-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/944-54-0x00000000010B0000-0x000000000116E000-memory.dmpFilesize
760KB
-
memory/992-138-0x0000000000432C26-mapping.dmp
-
memory/1356-82-0x0000000000000000-mapping.dmp
-
memory/1528-85-0x0000000000000000-mapping.dmp
-
memory/1628-117-0x0000000000080000-0x00000000000FF000-memory.dmpFilesize
508KB
-
memory/1628-111-0x0000000000080000-0x00000000000FF000-memory.dmpFilesize
508KB
-
memory/1628-104-0x0000000000432C26-mapping.dmp
-
memory/1688-121-0x0000000000000000-mapping.dmp
-
memory/1688-123-0x0000000001290000-0x000000000134E000-memory.dmpFilesize
760KB
-
memory/1716-150-0x0000000000000000-mapping.dmp
-
memory/1960-118-0x0000000000000000-mapping.dmp
-
memory/2044-84-0x0000000000000000-mapping.dmp