Analysis
-
max time kernel
13s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 13:56
Behavioral task
behavioral1
Sample
4e7c541d76152a9c82d5769860970018.exe
Resource
win7-20231215-en
General
-
Target
4e7c541d76152a9c82d5769860970018.exe
-
Size
1.4MB
-
MD5
4e7c541d76152a9c82d5769860970018
-
SHA1
1d0a791492c042502172a0d48d926e75587d411e
-
SHA256
9f3ecaeac8bae7c4e01a3e84e4d4d754b7b6f1920911bea65e7325faa76de078
-
SHA512
54d582b3e3932bcb8c52728cb2cd4284577696cbddcf07a570a6ca536808ca0b9af5fa0187dcf15769e36c3920c0bd0d032bd657210683bae78bf8f8debf02ce
-
SSDEEP
24576:S6yJMY9UFoRDhkeYM1jJR97zUbia9JVe0hs5WfBiERJchVML1bT6E7:VY9UORVOM1jJHzaiape0hsABFRJch6Lv
Malware Config
Extracted
remcos
2.5.0 Pro
GRACED
thankyoulord.ddns.net:5050
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-0S5XD9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/2276-9-0x0000000000B30000-0x0000000000B5C000-memory.dmp rezer0 -
Executes dropped EXE 1 IoCs
pid Process 2276 test.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 cmd.exe -
resource yara_rule behavioral1/memory/2644-0-0x0000000000400000-0x00000000006F1000-memory.dmp upx behavioral1/memory/2644-10-0x0000000000400000-0x00000000006F1000-memory.dmp upx behavioral1/memory/2644-28-0x0000000000400000-0x00000000006F1000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 2800 2276 test.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2276 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2276 test.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2656 2644 4e7c541d76152a9c82d5769860970018.exe 17 PID 2644 wrote to memory of 2656 2644 4e7c541d76152a9c82d5769860970018.exe 17 PID 2644 wrote to memory of 2656 2644 4e7c541d76152a9c82d5769860970018.exe 17 PID 2644 wrote to memory of 2656 2644 4e7c541d76152a9c82d5769860970018.exe 17 PID 2656 wrote to memory of 2276 2656 cmd.exe 18 PID 2656 wrote to memory of 2276 2656 cmd.exe 18 PID 2656 wrote to memory of 2276 2656 cmd.exe 18 PID 2656 wrote to memory of 2276 2656 cmd.exe 18 PID 2276 wrote to memory of 2952 2276 test.exe 31 PID 2276 wrote to memory of 2952 2276 test.exe 31 PID 2276 wrote to memory of 2952 2276 test.exe 31 PID 2276 wrote to memory of 2952 2276 test.exe 31 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33 PID 2276 wrote to memory of 2800 2276 test.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7c541d76152a9c82d5769860970018.exe"C:\Users\Admin\AppData\Local\Temp\4e7c541d76152a9c82d5769860970018.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vXAlJeWc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9869.tmp"4⤵
- Creates scheduled task(s)
PID:2952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"{path}"4⤵PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD566e444ad618f588c0bc398c61473aa2b
SHA15d234d14f2ed1209e064ba8a76d393b5fe905bfe
SHA25665b7957f8ed88c8a577180617429d82147a0294452431024ed6f121c1bfd6fc0
SHA512e0422f36aff078aff8c308e1211eb74714acef1eab0f79993ab94fa27cd49e957b3f6cb993655bf59513904d21b52fb6785a1d2e08f63fb7002aa83d70c243cb
-
Filesize
61KB
MD58766c1d8dbb3cdb62a0450085a72b7be
SHA1ebba99a4d291d6b188b0a10b25bb3b249bfb6185
SHA256e46e67fb64bfd3356b08b853f290e66ea18d6e272cc86a09ced4b07ddf1fa2e4
SHA512f688e2715b7e305d38502610a94d587a3b8d34c4245c5424d32b433288efe6f3ef2e724942d53636760296586382f1521b1da28d1c5b9829c3eae3faeb05da02
-
Filesize
1KB
MD581bd8ab36b5bada1a66e1d6aec930c19
SHA14d6a9e17edacbd058dc7780f6e90476baec51485
SHA256eebf931af3ee5475b0f680fa30650fdc7be47647e9dca05371de7cc0d142d153
SHA512ba308dc09c4ab636c7f6ff004ba18d0f448064c8220a3a8d2d595c9d893bb9f865525ae7f4b31978b699c3edbfce9439b6adfffb9a76f6f9a1279ac1e4301041
-
Filesize
70KB
MD59e4bc2530f4131f83f6f2d2167b4f5dc
SHA1f69fe17b11a2cd2b10b31614130a882056395f77
SHA256460189028f8aeeef9e7d58227d9e1790e337677f492d88f6ca8ddd7fec994954
SHA512bb1770e5c5c7911048f11e29eccbcc5d99095fe2ad70040e1f2f64cc45d27b7ba9b9d8199d73d44ea73944c726aa5dcd51a388380651440a5a8bb5eb5bda7351