Analysis
-
max time kernel
169s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
cad377f243b54e3dddfe149f4cd54c8a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cad377f243b54e3dddfe149f4cd54c8a.exe
Resource
win10v2004-20230220-en
General
-
Target
cad377f243b54e3dddfe149f4cd54c8a.exe
-
Size
925KB
-
MD5
cad377f243b54e3dddfe149f4cd54c8a
-
SHA1
bb9e4fc981c04378758051885dc6e5062145b11b
-
SHA256
14fb2daf697ee302647b7d63c26e94f443c9516a5a707b85952b1158e5ffe12a
-
SHA512
8937d17ec7b4305632bfb6f090baab30ff263a01e77877b4caf205a4100ddb3743632a6206f0c770c1896357121903228a14235d4f5cbee0a08a8fe6606a302d
-
SSDEEP
24576:PdWUwhh26ZKwupWOZBSV/UXsiff0dFB0cK74aRlLMGZYWkV3M:PdWXKwIrZsVc8isK74aPM5F
Malware Config
Extracted
remcos
RemoteHost
seanblacin.sytes.net:6110
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
chrcrh.exe
-
copy_folder
chrcrh
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
chrcrh
-
mouse_option
false
-
mutex
Rmc-FDI6XX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
chrcrh
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1288 set thread context of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 cad377f243b54e3dddfe149f4cd54c8a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85 PID 1288 wrote to memory of 1140 1288 cad377f243b54e3dddfe149f4cd54c8a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad377f243b54e3dddfe149f4cd54c8a.exe"C:\Users\Admin\AppData\Local\Temp\cad377f243b54e3dddfe149f4cd54c8a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\cad377f243b54e3dddfe149f4cd54c8a.exe"C:\Users\Admin\AppData\Local\Temp\cad377f243b54e3dddfe149f4cd54c8a.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5172e7c7d22bcfc99a815fc9dfed2b90d
SHA1910f8f3679997a6cd96dce09a4af1464110ba57f
SHA256a0c551e0a8584e3fc41a21c90b2cb016e8e07808fafa260cf053e833107ee787
SHA51296e419e96722bed2ce41d3b7489caaddbefaaeb3e17420bf4f36396252d9a867073f111080ec4f101a125e4eb3470349bc4e5659456916b24df6247e0e37edb1