Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2023 06:33
Static task
static1
Behavioral task
behavioral1
Sample
HSBC TT PAYMENT INVOICE 210 PDF.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
HSBC TT PAYMENT INVOICE 210 PDF.exe
Resource
win10v2004-20230703-en
General
-
Target
HSBC TT PAYMENT INVOICE 210 PDF.exe
-
Size
1.5MB
-
MD5
c250c41b07ca450fb508cde9c3c82a0a
-
SHA1
f3fc3ea3a55474d927d76e77b8a010ccc5b01067
-
SHA256
53858f99f0a277f251b4cce6e954c788b70ae847a401a4fdf553f020a6115ee5
-
SHA512
d50793ef1b94a5456da3295bea9f690dc3c6c75662a2d36b2d60e1c37d4b56dadbd574cb3dd771be57a55db4cfe44fb782aebf99b2c52f5dbe8b42abfa74b633
-
SSDEEP
12288:1YtLBBtnm3n0He9DlpzIpk1qaxbxQxkT4/rJw8flwykcnM9lPuTO47QpilQP/dU3:v6YLLFJpUpvgdxpbObtJrv6rk54Kb/d
Malware Config
Extracted
remcos
RemoteHost
103.212.81.160:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-8PXQFB
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2172 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-8PXQFB = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HSBC TT PAYMENT INVOICE 210 PDF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-8PXQFB = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HSBC TT PAYMENT INVOICE 210 PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1328 set thread context of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 1328 wrote to memory of 3536 1328 HSBC TT PAYMENT INVOICE 210 PDF.exe 92 PID 3536 wrote to memory of 2172 3536 HSBC TT PAYMENT INVOICE 210 PDF.exe 93 PID 3536 wrote to memory of 2172 3536 HSBC TT PAYMENT INVOICE 210 PDF.exe 93 PID 3536 wrote to memory of 2172 3536 HSBC TT PAYMENT INVOICE 210 PDF.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 210 PDF.exe"C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 210 PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 210 PDF.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c250c41b07ca450fb508cde9c3c82a0a
SHA1f3fc3ea3a55474d927d76e77b8a010ccc5b01067
SHA25653858f99f0a277f251b4cce6e954c788b70ae847a401a4fdf553f020a6115ee5
SHA512d50793ef1b94a5456da3295bea9f690dc3c6c75662a2d36b2d60e1c37d4b56dadbd574cb3dd771be57a55db4cfe44fb782aebf99b2c52f5dbe8b42abfa74b633
-
Filesize
1.5MB
MD5c250c41b07ca450fb508cde9c3c82a0a
SHA1f3fc3ea3a55474d927d76e77b8a010ccc5b01067
SHA25653858f99f0a277f251b4cce6e954c788b70ae847a401a4fdf553f020a6115ee5
SHA512d50793ef1b94a5456da3295bea9f690dc3c6c75662a2d36b2d60e1c37d4b56dadbd574cb3dd771be57a55db4cfe44fb782aebf99b2c52f5dbe8b42abfa74b633
-
Filesize
1.5MB
MD5c250c41b07ca450fb508cde9c3c82a0a
SHA1f3fc3ea3a55474d927d76e77b8a010ccc5b01067
SHA25653858f99f0a277f251b4cce6e954c788b70ae847a401a4fdf553f020a6115ee5
SHA512d50793ef1b94a5456da3295bea9f690dc3c6c75662a2d36b2d60e1c37d4b56dadbd574cb3dd771be57a55db4cfe44fb782aebf99b2c52f5dbe8b42abfa74b633