Analysis
-
max time kernel
22s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-03-2024 20:55
Static task
static1
1 signatures
General
-
Target
AppData.exe
-
Size
13.3MB
-
MD5
a648c447cd96d32e1702d470763e65ae
-
SHA1
37dd89ec51fa0cfc3c3f02cdd55603bcb2ff603e
-
SHA256
f739134b149d9d1df25eda3732e30e0db92c3c17877d243fdfdbc105f665876b
-
SHA512
6821e9a8e9eb30edd9c414eba987073e9a8c633556c10263bfa91643394a37f327d7463aacf8604469766212e411e543498df18497d0d47c116b3bf44526f911
-
SSDEEP
12288:eU+lCO+Gs1KyZ19P+CXsAUQn3zH4avp0Go:ep+Gskyl+CeQnD4SpA
Malware Config
Extracted
Family
remcos
Botnet
CHONDRE
C2
01marzo.con-ip.com:7770
Attributes
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3ZWN94
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1156 set thread context of 856 1156 AppData.exe 77 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 856 AppLaunch.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 856 1156 AppData.exe 77 PID 1156 wrote to memory of 5040 1156 AppData.exe 78 PID 1156 wrote to memory of 5040 1156 AppData.exe 78 PID 1156 wrote to memory of 5040 1156 AppData.exe 78 PID 1156 wrote to memory of 3452 1156 AppData.exe 79 PID 1156 wrote to memory of 3452 1156 AppData.exe 79 PID 1156 wrote to memory of 3452 1156 AppData.exe 79 PID 1156 wrote to memory of 248 1156 AppData.exe 80 PID 1156 wrote to memory of 248 1156 AppData.exe 80 PID 1156 wrote to memory of 248 1156 AppData.exe 80 PID 3452 wrote to memory of 2528 3452 cmd.exe 84 PID 3452 wrote to memory of 2528 3452 cmd.exe 84 PID 3452 wrote to memory of 2528 3452 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\AppData.exe"C:\Users\Admin\AppData\Local\Temp\AppData.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:856
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵PID:5040
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- Creates scheduled task(s)
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\AppData.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵PID:248
-