Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
DOCX_6802_1755_02_2023FINAL.exe
Resource
win7-20230712-en
General
-
Target
DOCX_6802_1755_02_2023FINAL.exe
-
Size
1.3MB
-
MD5
5c0c977e9713c9764f7382c0da3b5c17
-
SHA1
a38d48edefd468f5d01f9f870a3bc54941f100e8
-
SHA256
e45afde600fe6309191801a04d60dc61f43a74347de9cafc042c2ff579a69b89
-
SHA512
b25d0ca63386479c21d96a46a2bc81aae4f3bf37bccbaca7bcd31981b84cf7e45edfc5cfb731a0df01e43e9afbb0eddf79b3efd523f63a8188e601fea452c7ca
-
SSDEEP
12288:T3gndrEp7MW7O3AJYWhtAdsL38MsDpN9JUNXU+wEV:T3gGp9O3AJYEtT3sDL92N9V
Malware Config
Extracted
remcos
777
graciiasdios777.con-ip.com:7770
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DU2JK9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
DOCX_6802_1755_02_2023FINAL.exedescription pid process target process PID 2300 set thread context of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csc.exepid process 1744 csc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
DOCX_6802_1755_02_2023FINAL.execmd.exedescription pid process target process PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1744 2300 DOCX_6802_1755_02_2023FINAL.exe csc.exe PID 2300 wrote to memory of 1644 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 1644 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 1644 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 1644 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2428 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2428 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2428 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2428 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2428 wrote to memory of 2328 2428 cmd.exe schtasks.exe PID 2428 wrote to memory of 2328 2428 cmd.exe schtasks.exe PID 2428 wrote to memory of 2328 2428 cmd.exe schtasks.exe PID 2428 wrote to memory of 2328 2428 cmd.exe schtasks.exe PID 2300 wrote to memory of 2464 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2464 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2464 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe PID 2300 wrote to memory of 2464 2300 DOCX_6802_1755_02_2023FINAL.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCX_6802_1755_02_2023FINAL.exe"C:\Users\Admin\AppData\Local\Temp\DOCX_6802_1755_02_2023FINAL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\DOCX_6802_1755_02_2023FINAL.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD502e0ae6055aa8bdfcdcb8b0217dd39ca
SHA188f19921c45456ae8cddb75fcb5e61f51598d964
SHA25616b3f3913a040df9f5852e228c7944a89b2e148cff715a3881978761387be2fa
SHA512b17c443fff53cc4979fd821a4b2216f36d3fefd1c4aa044e0373977d2e04e86bc8c2b82644e38ef91edbd0be3dbbac4914f505fcf3563e4000eab5a9255124d6
-
memory/1744-83-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-119-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-57-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-59-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-60-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-61-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-82-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-63-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-64-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-65-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1744-69-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-74-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-79-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-125-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-80-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-62-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-84-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-124-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-92-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-93-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-117-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-98-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-99-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-105-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-106-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-111-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/1744-112-0x0000000000080000-0x0000000000101000-memory.dmpFilesize
516KB
-
memory/2300-54-0x0000000000BB0000-0x0000000000CDE000-memory.dmpFilesize
1.2MB
-
memory/2300-55-0x0000000074A50000-0x000000007513E000-memory.dmpFilesize
6.9MB
-
memory/2300-87-0x0000000074A50000-0x000000007513E000-memory.dmpFilesize
6.9MB
-
memory/2300-56-0x0000000002180000-0x00000000021C0000-memory.dmpFilesize
256KB