Analysis
-
max time kernel
48s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:45
Static task
static1
Behavioral task
behavioral1
Sample
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
Resource
win10v2004-20231215-en
General
-
Target
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
-
Size
697KB
-
MD5
26d1beca6157aa1ea3ba22dfe6ed8bad
-
SHA1
36838403ed23cc30c7294b5fc6d34045e8aa889d
-
SHA256
e9347ac566eadef7764b0d50c64ca06561171f30392b1d37d1ee8cdde6c0b145
-
SHA512
7e7832161497a3a78fde2636ec065761494ed753a7ecb405db2bc79b652a1077fc2a20fa04b28542d183b3004c9523a3ed7d24bbf697f4a6430a92f383d559f0
-
SSDEEP
12288:/a4uMk2dgCRi4/OMhaHYD4zfTx+wFjd1g2iN:/aG4jMhaHYDWV+Qbg1
Malware Config
Extracted
remcos
1.7 Pro
Host
swrypaiii.ydns.eu:8976
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_xawtetfkrdejvrj
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 26d1beca6157aa1ea3ba22dfe6ed8bad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3016 PING.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2528 wrote to memory of 2596 2528 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 30 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2596 wrote to memory of 2696 2596 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 33 PID 2696 wrote to memory of 3016 2696 cmd.exe 32 PID 2696 wrote to memory of 3016 2696 cmd.exe 32 PID 2696 wrote to memory of 3016 2696 cmd.exe 32 PID 2696 wrote to memory of 3016 2696 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"4⤵PID:2204
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵PID:740
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 21⤵
- Runs ping.exe
PID:3016