Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
9286304f3592ab2de2d549722e6869b8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9286304f3592ab2de2d549722e6869b8.exe
Resource
win10v2004-20230703-en
General
-
Target
9286304f3592ab2de2d549722e6869b8.exe
-
Size
1.6MB
-
MD5
9286304f3592ab2de2d549722e6869b8
-
SHA1
fee5ef729c85412275c371da5d1360fae7a87e44
-
SHA256
90199e919b753c405f76a253d0994209b7231e9f1927d9af81e6bc022f93235b
-
SHA512
59e323202b6c9ba2239e8eaf2d6c4bc416a61ce28edeace8655791b81023c253aba6f87075752bbbe3d127fd45837bd7d3abfc44f768266cc1325289ce030d9a
-
SSDEEP
49152:MrS/XYg7k3aKoznVWeOYvsEyKbNWCpQf:MiXPjB5PFJy
Malware Config
Extracted
remcos
RemoteHost
212.193.30.230:3343
79.110.49.161:3343
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CQL1U6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9286304f3592ab2de2d549722e6869b8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evmswr = "C:\\Users\\Admin\\AppData\\Roaming\\Evmswr.exe" 9286304f3592ab2de2d549722e6869b8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9286304f3592ab2de2d549722e6869b8.exedescription pid process target process PID 816 set thread context of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9286304f3592ab2de2d549722e6869b8.exepowershell.exedescription pid process Token: SeDebugPrivilege 816 9286304f3592ab2de2d549722e6869b8.exe Token: SeDebugPrivilege 1076 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 1536 MSBuild.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
9286304f3592ab2de2d549722e6869b8.execmd.exedescription pid process target process PID 816 wrote to memory of 2376 816 9286304f3592ab2de2d549722e6869b8.exe cmd.exe PID 816 wrote to memory of 2376 816 9286304f3592ab2de2d549722e6869b8.exe cmd.exe PID 816 wrote to memory of 2376 816 9286304f3592ab2de2d549722e6869b8.exe cmd.exe PID 816 wrote to memory of 2376 816 9286304f3592ab2de2d549722e6869b8.exe cmd.exe PID 2376 wrote to memory of 1076 2376 cmd.exe powershell.exe PID 2376 wrote to memory of 1076 2376 cmd.exe powershell.exe PID 2376 wrote to memory of 1076 2376 cmd.exe powershell.exe PID 2376 wrote to memory of 1076 2376 cmd.exe powershell.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe PID 816 wrote to memory of 1536 816 9286304f3592ab2de2d549722e6869b8.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe"C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell set-mppreference -exclusionpath C:\2⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell set-mppreference -exclusionpath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD572ce5e9b8fe196aa4e7738eec216c8ee
SHA1bd32b19bc4867ddb9ae65389941f45b459a88e07
SHA2566c245f51e0713d0571f557d3bfad9dde5050bfbf0f0afd58700515fc7b621d4d
SHA512c4d19590eb943544db572869ce031736c4bd397617c072b8363c051c8d778482625b4a780f17399f111a961b512fdf05939e89aa0d13a3a2252c0ff112784767