Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
a648c447cd96d32e1702d470763e65ae.exe
Resource
win7-20240221-en
General
-
Target
a648c447cd96d32e1702d470763e65ae.exe
-
Size
13.3MB
-
MD5
a648c447cd96d32e1702d470763e65ae
-
SHA1
37dd89ec51fa0cfc3c3f02cdd55603bcb2ff603e
-
SHA256
f739134b149d9d1df25eda3732e30e0db92c3c17877d243fdfdbc105f665876b
-
SHA512
6821e9a8e9eb30edd9c414eba987073e9a8c633556c10263bfa91643394a37f327d7463aacf8604469766212e411e543498df18497d0d47c116b3bf44526f911
-
SSDEEP
12288:eU+lCO+Gs1KyZ19P+CXsAUQn3zH4avp0Go:ep+Gskyl+CeQnD4SpA
Malware Config
Extracted
remcos
CHONDRE
01marzo.con-ip.com:7770
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3ZWN94
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5076 set thread context of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3964 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3920 AppLaunch.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 3920 5076 a648c447cd96d32e1702d470763e65ae.exe 90 PID 5076 wrote to memory of 4092 5076 a648c447cd96d32e1702d470763e65ae.exe 91 PID 5076 wrote to memory of 4092 5076 a648c447cd96d32e1702d470763e65ae.exe 91 PID 5076 wrote to memory of 4092 5076 a648c447cd96d32e1702d470763e65ae.exe 91 PID 5076 wrote to memory of 3764 5076 a648c447cd96d32e1702d470763e65ae.exe 93 PID 5076 wrote to memory of 3764 5076 a648c447cd96d32e1702d470763e65ae.exe 93 PID 5076 wrote to memory of 3764 5076 a648c447cd96d32e1702d470763e65ae.exe 93 PID 5076 wrote to memory of 1832 5076 a648c447cd96d32e1702d470763e65ae.exe 94 PID 5076 wrote to memory of 1832 5076 a648c447cd96d32e1702d470763e65ae.exe 94 PID 5076 wrote to memory of 1832 5076 a648c447cd96d32e1702d470763e65ae.exe 94 PID 3764 wrote to memory of 3964 3764 cmd.exe 97 PID 3764 wrote to memory of 3964 3764 cmd.exe 97 PID 3764 wrote to memory of 3964 3764 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a648c447cd96d32e1702d470763e65ae.exe"C:\Users\Admin\AppData\Local\Temp\a648c447cd96d32e1702d470763e65ae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵PID:4092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- Creates scheduled task(s)
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\a648c447cd96d32e1702d470763e65ae.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5abbb35e21906b8883ac23d8f5b32a32c
SHA147e50d1c23f7cf1f0abb966fa08b75bc2b77e0f1
SHA25601dfd133c544470a5e52585de9449fc128def578ae2a695c58f62ec011d52d74
SHA51200df112bb8e95deee97e1c6d533d819eaa4212eb3bdcdb3b99876818ba52e29c26808ee0f4dbf51b1268c1b6d72d1ce4b442d6fe7cc91a492276dea8c71ff34d