Overview
overview
10Static
static
1List of su...ts.lnk
windows7-x64
10List of su...ts.lnk
windows10-2004-x64
10List of su...ll.dll
windows7-x64
1List of su...ll.dll
windows10-2004-x64
1List of su...es.pdf
windows7-x64
1List of su...es.pdf
windows10-2004-x64
1List of su...40.dll
windows7-x64
3List of su...40.dll
windows10-2004-x64
3List of su...gr.dll
windows7-x64
1List of su...gr.dll
windows10-2004-x64
3List of su...rv.exe
windows7-x64
10List of su...rv.exe
windows10-2004-x64
10List of su...dt.dll
windows7-x64
1List of su...dt.dll
windows10-2004-x64
1List of su...40.dll
windows7-x64
List of su...40.dll
windows10-2004-x64
3List of su...ce.dll
windows7-x64
1List of su...ce.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
List of suspected clients/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
List of suspected clients/WCLDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
List of suspected clients/moorefiles.pdf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
List of suspected clients/moorefiles.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
List of suspected clients/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
List of suspected clients/msvcp140.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
List of suspected clients/ptMgr.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
List of suspected clients/ptMgr.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
List of suspected clients/ptSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
List of suspected clients/ptSrv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
List of suspected clients/ptusredt.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
List of suspected clients/ptusredt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
List of suspected clients/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
List of suspected clients/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
List of suspected clients/wbxtrace.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
List of suspected clients/wbxtrace.dll
Resource
win10v2004-20240226-en
General
-
Target
List of suspected clients/ptSrv.exe
-
Size
202KB
-
MD5
64179e64675e822559cac6652298bdfc
-
SHA1
cceed3b2441146762512918af7bf7f89fb055583
-
SHA256
c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
-
SHA512
ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280
-
SSDEEP
3072:EMtKztOp6KfOQqoY3ltdNjlcwsSdplkrxf+Uyecgw:ELKfOQLY3l9jlcwnlUf+z7gw
Malware Config
Extracted
remcos
4.9.2 Light
RemoteHost
66.154.102.133:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-W6WVSY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 2588 2700 ptSrv.exe 29 -
Executes dropped EXE 1 IoCs
pid Process 2700 ptSrv.exe -
Loads dropped DLL 5 IoCs
pid Process 1708 ptSrv.exe 2700 ptSrv.exe 2700 ptSrv.exe 2700 ptSrv.exe 2588 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1708 ptSrv.exe 2700 ptSrv.exe 2700 ptSrv.exe 2588 cmd.exe 2588 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2700 ptSrv.exe 2588 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2700 1708 ptSrv.exe 28 PID 1708 wrote to memory of 2700 1708 ptSrv.exe 28 PID 1708 wrote to memory of 2700 1708 ptSrv.exe 28 PID 1708 wrote to memory of 2700 1708 ptSrv.exe 28 PID 2700 wrote to memory of 2588 2700 ptSrv.exe 29 PID 2700 wrote to memory of 2588 2700 ptSrv.exe 29 PID 2700 wrote to memory of 2588 2700 ptSrv.exe 29 PID 2700 wrote to memory of 2588 2700 ptSrv.exe 29 PID 2700 wrote to memory of 2588 2700 ptSrv.exe 29 PID 2588 wrote to memory of 1500 2588 cmd.exe 33 PID 2588 wrote to memory of 1500 2588 cmd.exe 33 PID 2588 wrote to memory of 1500 2588 cmd.exe 33 PID 2588 wrote to memory of 1500 2588 cmd.exe 33 PID 2588 wrote to memory of 1500 2588 cmd.exe 33 PID 2588 wrote to memory of 1500 2588 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵PID:1500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c8c6d9830d857f6c5bab5be513497512
SHA11f58bfa13522e174e7cbe8a3fa3ec3d3001d2f17
SHA256cbe82142612770eea3a8cf109192fe16637f58c582f74e8099e2fa8635ebef54
SHA512d12f687625ef0a40eac33f836081fa6a61657ae1bd5312f8346b36085311ad89b811a908fbac5f1c5782353b8e0e000897ce8f0bdd2d4fdef2e7a815a60d9c09
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
41KB
MD5cd162f403f22216679f486ffa15fa534
SHA1dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9
SHA2569f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2
SHA512b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e
-
Filesize
875KB
MD5a12fc5b2c56174be480fc3c720c7fcdd
SHA148cc8b9a3cd29bcc57a244dee5300d02e2487cf0
SHA256c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2
SHA5128abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1
-
Filesize
103KB
MD5530af153319a8254261d2de81b40cfe7
SHA163c7fb08e4dfe1e1cbd40a0fb333472822daa60a
SHA256098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3
SHA5126a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805
-
Filesize
202KB
MD564179e64675e822559cac6652298bdfc
SHA1cceed3b2441146762512918af7bf7f89fb055583
SHA256c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
SHA512ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280