Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 05:43
Static task
static1
Behavioral task
behavioral1
Sample
HSBC TT PAYMENT INVOICE 201.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
HSBC TT PAYMENT INVOICE 201.exe
Resource
win10v2004-20230703-en
General
-
Target
HSBC TT PAYMENT INVOICE 201.exe
-
Size
1.5MB
-
MD5
5f99eee968415ded76c49d8841f04276
-
SHA1
5871818f94cd8c5305a523c20666f3aec577899c
-
SHA256
6a7e9302a2021b26270808b18e5701732e1f063bbe32223b6b1952852c86aa21
-
SHA512
d7b154f9d3574e37d79031094e7e4126f500f847f21c6c72d4fddf00e7f917c2d7189b829377a3f743e4dcd7327720bde88f76bbeff18382220b5c41f2dd8085
-
SSDEEP
24576:+DPTrJ9EPegxSA41yyhgD7pnhztkcJbyTxP67AUxlSizlYxKFz6N0:aR1Xg/pnhztxWxP6LSizl4KFg
Malware Config
Extracted
remcos
RemoteHost
103.212.81.155:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GY4RIT
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation HSBC TT PAYMENT INVOICE 201.exe -
Executes dropped EXE 1 IoCs
pid Process 864 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-GY4RIT = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HSBC TT PAYMENT INVOICE 201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GY4RIT = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HSBC TT PAYMENT INVOICE 201.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 2912 wrote to memory of 4408 2912 HSBC TT PAYMENT INVOICE 201.exe 91 PID 4408 wrote to memory of 864 4408 HSBC TT PAYMENT INVOICE 201.exe 92 PID 4408 wrote to memory of 864 4408 HSBC TT PAYMENT INVOICE 201.exe 92 PID 4408 wrote to memory of 864 4408 HSBC TT PAYMENT INVOICE 201.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 201.exe"C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 201.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\HSBC TT PAYMENT INVOICE 201.exe"{path}"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
PID:864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55f99eee968415ded76c49d8841f04276
SHA15871818f94cd8c5305a523c20666f3aec577899c
SHA2566a7e9302a2021b26270808b18e5701732e1f063bbe32223b6b1952852c86aa21
SHA512d7b154f9d3574e37d79031094e7e4126f500f847f21c6c72d4fddf00e7f917c2d7189b829377a3f743e4dcd7327720bde88f76bbeff18382220b5c41f2dd8085
-
Filesize
1.5MB
MD55f99eee968415ded76c49d8841f04276
SHA15871818f94cd8c5305a523c20666f3aec577899c
SHA2566a7e9302a2021b26270808b18e5701732e1f063bbe32223b6b1952852c86aa21
SHA512d7b154f9d3574e37d79031094e7e4126f500f847f21c6c72d4fddf00e7f917c2d7189b829377a3f743e4dcd7327720bde88f76bbeff18382220b5c41f2dd8085
-
Filesize
1.5MB
MD55f99eee968415ded76c49d8841f04276
SHA15871818f94cd8c5305a523c20666f3aec577899c
SHA2566a7e9302a2021b26270808b18e5701732e1f063bbe32223b6b1952852c86aa21
SHA512d7b154f9d3574e37d79031094e7e4126f500f847f21c6c72d4fddf00e7f917c2d7189b829377a3f743e4dcd7327720bde88f76bbeff18382220b5c41f2dd8085