Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 09:07
Behavioral task
behavioral1
Sample
bTQu.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bTQu.exe
Resource
win10v2004-20240226-en
General
-
Target
bTQu.exe
-
Size
233KB
-
MD5
e8f66cc84d8cf1bb42d8fb8b88b7e5d4
-
SHA1
2a241b028f4e3b2a9ac938315ee3db2f3267fbc3
-
SHA256
d6c4e74a2a9ccdbe06290419c73185b032757f9d595b42029e8c245406a5731e
-
SHA512
dd1a20c18f2c3b6372ffb37d3290d324b401f6ad897ffacb1c703b0b28f202f2afd6283117def76c5f96c075b5057c23efe7b50be7a16101a33895b81abe6188
-
SSDEEP
6144:5mvl3n8iOiB4RBucKa3h80tK2gBWvADGGw6j1:IvlX8i8RB5JvADGGnj
Malware Config
Extracted
remcos
RemoteHost
payday27.duckdns.org:4546
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-MQ397Z
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
resource yara_rule behavioral2/memory/1604-0-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-4-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-7-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-10-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-12-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-19-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-24-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-28-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-31-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-33-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-36-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1604-43-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 bTQu.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e832779fdd8202c2a7fab7c44a576d60
SHA178fa9dd3e2913d19559b5a6f2cd7298171fae7d5
SHA2565bb8bf267a56030d1ec9b61609cf4f06e2714fd903f265ef14fc343cc934e050
SHA512922e50516d4218dd8b2e34b6a1ca6c1da729ecfc3c6542f7382f1402692d4f7472b16b320ecf9a7f9754bd82e86b3b66a0678fa6ff5d8ae8669488e2e3fbb3d6