Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
2096f56d969032aed11743289a2d2b68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2096f56d969032aed11743289a2d2b68.exe
Resource
win10v2004-20231215-en
General
-
Target
2096f56d969032aed11743289a2d2b68.exe
-
Size
448KB
-
MD5
2096f56d969032aed11743289a2d2b68
-
SHA1
1c0571a242dc3dec5e561976eff61636cff8ec4d
-
SHA256
d2ddf328f9bc2570c63dd0e9577dc0a92cdee8e7bbbe9bf90a8fb59d37b368bd
-
SHA512
01cd285fe85c32a116186c83343bab2c9124b6d22719b24ed66c3734571ee557b9ed6233ab17de4970d9168af094f8c705cdc1cb28ad1e460e7c3450379d83f9
-
SSDEEP
6144:vncnC4kfdUyRxVnAO77L978NjNHWT1UzHHeTIfy4B60S:V4aZ7AOjMjN2T1UzH+UK4B6
Malware Config
Extracted
remcos
1.7 Pro
SPAMMING
tobi12345.hopto.org:50501
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
win32.exe
-
copy_folder
win32
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%Temp%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_rbhptjsewo
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3764-8-0x0000000006DC0000-0x0000000006E32000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-30-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-54-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-72-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-70-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-68-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-66-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-64-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-62-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-60-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-58-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-56-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-52-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-50-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-48-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-46-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-44-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-42-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-40-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-38-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-36-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-34-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-32-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-28-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-26-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-24-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-22-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-20-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-18-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-16-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-14-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-12-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-10-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 behavioral2/memory/3764-9-0x0000000006DC0000-0x0000000006E2C000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2096f56d969032aed11743289a2d2b68.exe -
Executes dropped EXE 2 IoCs
pid Process 3096 win32.exe 4544 win32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\win32\\win32.exe\"" 2096f56d969032aed11743289a2d2b68.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3764 set thread context of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3096 set thread context of 4544 3096 win32.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4968 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3764 2096f56d969032aed11743289a2d2b68.exe 3764 2096f56d969032aed11743289a2d2b68.exe 3096 win32.exe 3096 win32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3764 2096f56d969032aed11743289a2d2b68.exe Token: SeDebugPrivilege 3096 win32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3764 wrote to memory of 3636 3764 2096f56d969032aed11743289a2d2b68.exe 100 PID 3636 wrote to memory of 688 3636 2096f56d969032aed11743289a2d2b68.exe 103 PID 3636 wrote to memory of 688 3636 2096f56d969032aed11743289a2d2b68.exe 103 PID 3636 wrote to memory of 688 3636 2096f56d969032aed11743289a2d2b68.exe 103 PID 688 wrote to memory of 4968 688 cmd.exe 101 PID 688 wrote to memory of 4968 688 cmd.exe 101 PID 688 wrote to memory of 4968 688 cmd.exe 101 PID 688 wrote to memory of 3096 688 cmd.exe 104 PID 688 wrote to memory of 3096 688 cmd.exe 104 PID 688 wrote to memory of 3096 688 cmd.exe 104 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109 PID 3096 wrote to memory of 4544 3096 win32.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2096f56d969032aed11743289a2d2b68.exe"C:\Users\Admin\AppData\Local\Temp\2096f56d969032aed11743289a2d2b68.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\2096f56d969032aed11743289a2d2b68.exeC:\Users\Admin\AppData\Local\Temp\2096f56d969032aed11743289a2d2b68.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\win32\win32.exe"C:\Users\Admin\AppData\Local\Temp\win32\win32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\win32.exeC:\Users\Admin\AppData\Local\Temp\win32.exe5⤵
- Executes dropped EXE
PID:4544
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 21⤵
- Runs ping.exe
PID:4968