Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2023 15:41
Static task
static1
Behavioral task
behavioral1
Sample
0b94975f5dde6feab979853991933616.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0b94975f5dde6feab979853991933616.exe
Resource
win10v2004-20230220-en
General
-
Target
0b94975f5dde6feab979853991933616.exe
-
Size
1.0MB
-
MD5
0b94975f5dde6feab979853991933616
-
SHA1
6b15f943d7ae7e265e455026a70b2116bc7a407d
-
SHA256
a6bf09d8242fd2933426629a504f995a5d624d555bd2f28a49876762ec0a03a6
-
SHA512
7e8a156ea625dbe2d15f76a70bd79b6a123526ee1d71450b8e16b3df069f9cf6c2d25e9ee7796d644891537ee243618ae39ede7f4e1c75a66618c9ab1e452a37
-
SSDEEP
24576:cWRK9jeP8CWr4cBKXh83adVzgXF37tBJp:cWQ9+8Br45Xe36VS37H
Malware Config
Extracted
remcos
RemoteHost
seanblacin.sytes.net:6110
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
chrcrh.exe
-
copy_folder
chrcrh
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
chrcrh
-
mouse_option
false
-
mutex
Rmc-FDI6XX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
chrcrh
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 208 1960 0b94975f5dde6feab979853991933616.exe 86 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 208 0b94975f5dde6feab979853991933616.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86 PID 1960 wrote to memory of 208 1960 0b94975f5dde6feab979853991933616.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b94975f5dde6feab979853991933616.exe"C:\Users\Admin\AppData\Local\Temp\0b94975f5dde6feab979853991933616.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\0b94975f5dde6feab979853991933616.exe"C:\Users\Admin\AppData\Local\Temp\0b94975f5dde6feab979853991933616.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5039f70a26396e022421199b97171d26f
SHA1205e1bea6be5bea1bdfd5f00157828156e57e6fd
SHA25617c367b1097f97ffb429165b0ea8a1b39506209c091e7dca12cc80e183e97e65
SHA512c4308c8235f715096602c9dad1bef4d6be628c2394ef47bbf71d51205c227c9d588dcc5402dd1db5ff2954eb86193104cef07c1b30b26444360148ca4cb4ab63