Analysis
-
max time kernel
178s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 09:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10012024_1753_gbrem.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
10012024_1753_gbrem.exe
-
Size
15.6MB
-
MD5
b6a22c3dfc954914f051aa33d2e2af1a
-
SHA1
18a53be63f02b68b9772a892816f83a6d97a1789
-
SHA256
564d742044e5ac9f6279c01c5c29bb801606b63c6c2cbfc2af09d8f2a73b84a6
-
SHA512
4dad54e04a99cdfbe473813647bb95e4410964b3fde126faca497f27ca8bcbcbd81f41129716af6a948a131282b6bde003b172b4cdcc33825d53c3144509a23f
-
SSDEEP
393216:XsMcUFlcXXZKTMlViqmu0k4nj8AcVwecyccnauSbb1LcVm:8pnZKTMlgfkMXcVMyouSbbK
Malware Config
Extracted
Family
remcos
Botnet
dvg
Attributes
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
word.exe
-
copy_folder
DVG
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
dgvsv-Z4Y1VB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 3692 3720 10012024_1753_gbrem.exe 105 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105 PID 3720 wrote to memory of 3692 3720 10012024_1753_gbrem.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\10012024_1753_gbrem.exe"C:\Users\Admin\AppData\Local\Temp\10012024_1753_gbrem.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\10012024_1753_gbrem.exe"C:\Users\Admin\AppData\Local\Temp\10012024_1753_gbrem.exe"2⤵PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3692 -ip 36921⤵PID:4040