Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
REHM0987656700.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
REHM0987656700.jar
Resource
win10v2004-20230220-en
General
-
Target
REHM0987656700.jar
-
Size
692KB
-
MD5
b71624aadb02108cdcd82a52fcaddc5a
-
SHA1
da6275f2c13b5dec593e033e213d57309e09080a
-
SHA256
fd5a7007699ad2361e69dfad9fc1351ea8405d3d71b7bd6332f455d11986fd2b
-
SHA512
4b20f0850ed2f517d384110969776f7d21274bfc58da557f669fbd0c640d101118534c41eb1264bab45840d16dea4f86d256859fdb212c68e176012303468dfc
-
SSDEEP
12288:bj/GJI7rQ9a0qhMFqEL3TLVGUBiy2wARvX9D1a+hMFqEL3TLVGUBiy2wARvX9D1W:fG6KyhMFqEUny21RvNDc+hMFqEUny21w
Malware Config
Extracted
remcos
RemoteHost
208.67.107.123:8780
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CL3TZF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3980 fEYW.exe 3444 Fd0THmyJKXBF.exe 2792 fEYW.exe 1148 Fd0THmyJKXBF.exe -
Loads dropped DLL 2 IoCs
pid Process 3444 Fd0THmyJKXBF.exe 3980 fEYW.exe -
resource yara_rule behavioral2/memory/2792-196-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-200-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-205-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-207-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-209-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/1148-211-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-214-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-215-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-217-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-218-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-219-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-220-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-222-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-223-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-224-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-226-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-227-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-229-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-230-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-232-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-233-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-234-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-235-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-237-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-238-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-239-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-241-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-242-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-243-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-244-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-246-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-247-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-248-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-249-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-251-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-252-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-253-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-255-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-256-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-257-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-258-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-260-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-261-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-262-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-263-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-265-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-266-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-267-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-269-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-270-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-271-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-272-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-274-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-275-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2792-276-0x0000000000400000-0x0000000000488000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\plueajfoxt = "C:\\Users\\Admin\\AppData\\Roaming\\lhqavfokt\\pyiemvrbwg.exe C:\\Users\\Admin\\fEYW.exe" fEYW.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3980 set thread context of 2792 3980 fEYW.exe 88 PID 3444 set thread context of 1148 3444 Fd0THmyJKXBF.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3444 Fd0THmyJKXBF.exe 3980 fEYW.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3636 java.exe 2792 fEYW.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3636 wrote to memory of 3980 3636 java.exe 86 PID 3636 wrote to memory of 3980 3636 java.exe 86 PID 3636 wrote to memory of 3980 3636 java.exe 86 PID 3636 wrote to memory of 3444 3636 java.exe 87 PID 3636 wrote to memory of 3444 3636 java.exe 87 PID 3636 wrote to memory of 3444 3636 java.exe 87 PID 3980 wrote to memory of 2792 3980 fEYW.exe 88 PID 3980 wrote to memory of 2792 3980 fEYW.exe 88 PID 3980 wrote to memory of 2792 3980 fEYW.exe 88 PID 3444 wrote to memory of 1148 3444 Fd0THmyJKXBF.exe 89 PID 3444 wrote to memory of 1148 3444 Fd0THmyJKXBF.exe 89 PID 3444 wrote to memory of 1148 3444 Fd0THmyJKXBF.exe 89 PID 3444 wrote to memory of 1148 3444 Fd0THmyJKXBF.exe 89 PID 3980 wrote to memory of 2792 3980 fEYW.exe 88
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\REHM0987656700.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\fEYW.exeC:\Users\Admin\fEYW.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\fEYW.exe"C:\Users\Admin\fEYW.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
-
C:\Users\Admin\Fd0THmyJKXBF.exe"C:\Users\Admin\Fd0THmyJKXBF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\Fd0THmyJKXBF.exe"C:\Users\Admin\Fd0THmyJKXBF.exe"3⤵
- Executes dropped EXE
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a50f9ddc2449c42a2b5714db404493fe
SHA1cfe45ab1538ac5b9d7592c7d5b85203ba15313e1
SHA256942d3c535d69171a76fc71f481d658636977524a80ff13c114f29f9799e011e4
SHA51278d91f9551de0bfea794fe89624d401e1547cee086a48ecbb83ea18c76b2927a16c306774e29e24a0254d23fdfa8959a1394a502b98001aaa5ec0de3f018d56b
-
Filesize
250KB
MD58a9b1f789ee27e4b429c164ff4b1af06
SHA12c1f029a5722d310175e8c773e8e1ff816f6c10d
SHA256bc7a16698b23ce3d03ee43bab193afed19c72c30e2fca979ce33f1c30ab4c9bf
SHA512961c7a87d8212d89235bde930b3d370c5ca35c9a5a5a2b4d6363daf2e0b01684b6e1db4d5cf141dd9c23e0abaca3bcf8db1968dd2a9d310e21f3b215897a417b
-
Filesize
4KB
MD587f91f528b14259a5b278cead56e1a8d
SHA11fd83b5e040583c85979ed79b72562e320877525
SHA25687ebb05472d47604e9f3b4adae68164249750cd8dd4ec1b47a6a7f480b7668df
SHA512752f8e5efda57e3af6b782d65115b32d8b09ffc76532fad069e52bf71af95f71faa32703d398b7ca9d5e04796ee19e53db186f4c828f5f2b55d78d75892dcb34
-
Filesize
4KB
MD587f91f528b14259a5b278cead56e1a8d
SHA11fd83b5e040583c85979ed79b72562e320877525
SHA25687ebb05472d47604e9f3b4adae68164249750cd8dd4ec1b47a6a7f480b7668df
SHA512752f8e5efda57e3af6b782d65115b32d8b09ffc76532fad069e52bf71af95f71faa32703d398b7ca9d5e04796ee19e53db186f4c828f5f2b55d78d75892dcb34
-
Filesize
4KB
MD587f91f528b14259a5b278cead56e1a8d
SHA11fd83b5e040583c85979ed79b72562e320877525
SHA25687ebb05472d47604e9f3b4adae68164249750cd8dd4ec1b47a6a7f480b7668df
SHA512752f8e5efda57e3af6b782d65115b32d8b09ffc76532fad069e52bf71af95f71faa32703d398b7ca9d5e04796ee19e53db186f4c828f5f2b55d78d75892dcb34
-
Filesize
8KB
MD5f40a61da40e7e4a38a668290b3535215
SHA173d99683a89efc8b520da3c39936dfd1fd7aa3cc
SHA256a436ed09634ca54e8b9b873d92de1e2761e7529d9e42f2a5c414d5dd01a52fb9
SHA512c8e6e3bd84bb8984e7d19be4abf901edcbe5ad167dcc1139aa03c2d67e68a1460d3dfba17136660ec84235d08722b2a62da94308f9a41244b1784340062cd929
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6
-
Filesize
286KB
MD521d7e6a7507b8efc37c796ef12068046
SHA1420287e3f99daa9c250c2bdf0649e1a692f95fbe
SHA2563b1e9fdaa4498632c2bba540bfd00bb27a5301cd53eb7d298169c6a80beec3d8
SHA512fea7b0674596f4915bacfccfd838bd0adf949e634e83bd38ecdbb99269b6925f881e4e7b4421c579be8dafc98e955e5320469d63f0d43dc8ac3b8a3c88cea4f6