Analysis
-
max time kernel
40s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:45
Static task
static1
Behavioral task
behavioral1
Sample
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
Resource
win10v2004-20231215-en
General
-
Target
26d1beca6157aa1ea3ba22dfe6ed8bad.exe
-
Size
697KB
-
MD5
26d1beca6157aa1ea3ba22dfe6ed8bad
-
SHA1
36838403ed23cc30c7294b5fc6d34045e8aa889d
-
SHA256
e9347ac566eadef7764b0d50c64ca06561171f30392b1d37d1ee8cdde6c0b145
-
SHA512
7e7832161497a3a78fde2636ec065761494ed753a7ecb405db2bc79b652a1077fc2a20fa04b28542d183b3004c9523a3ed7d24bbf697f4a6430a92f383d559f0
-
SSDEEP
12288:/a4uMk2dgCRi4/OMhaHYD4zfTx+wFjd1g2iN:/aG4jMhaHYDWV+Qbg1
Malware Config
Extracted
remcos
1.7 Pro
Host
swrypaiii.ydns.eu:8976
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_xawtetfkrdejvrj
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 26d1beca6157aa1ea3ba22dfe6ed8bad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3252 set thread context of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4168 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102 PID 3252 wrote to memory of 4924 3252 26d1beca6157aa1ea3ba22dfe6ed8bad.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"C:\Users\Admin\AppData\Local\Temp\26d1beca6157aa1ea3ba22dfe6ed8bad.exe"2⤵
- Adds Run key to start application
PID:4924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "1⤵PID:5048
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 22⤵
- Runs ping.exe
PID:4168
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"2⤵PID:4600
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"3⤵PID:3508
-
-