Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
Resource
win11-20240214-en
General
-
Target
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
-
Size
958KB
-
MD5
aa3cdd5145d9fb980c061d2d8653fa8d
-
SHA1
de696701275b01ddad5461e269d7ab15b7466d6a
-
SHA256
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2
-
SHA512
4be32b5e9eaffa8d3f4cce515717faa6259373e8dbd258b9ebc2534fd0b62aaa7043093204e43627983fe332f63d8f998a90dc1cbb74f54a18c55f67e42a8a32
-
SSDEEP
24576:PExy+NP2Gc/hgXzYRVG7mRPQeMeokqjVnlqud+/2P+A:6+Gc/hD67mJQeMhkqXfd+/9A
Malware Config
Extracted
remcos
Go!!!
dangerous.hopto.org:2404
dangerous.hopto.org:2602
91.92.242.184:2602
91.92.242.184:2404
-
audio_folder
??????????? ??????
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
taskhost.exe
-
copy_folder
System32
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
tapiui.dat
-
keylog_flag
false
-
keylog_folder
System32
-
mouse_option
false
-
mutex
???-LDKG91
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
?????????
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\???-LDKG91 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32\\taskhost.exe\"" clip.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4064 wrote to memory of 4980 4064 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 100 PID 4980 wrote to memory of 1756 4980 clip.exe 101 PID 4980 wrote to memory of 1756 4980 clip.exe 101 PID 4980 wrote to memory of 1756 4980 clip.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe"C:\Users\Admin\AppData\Local\Temp\41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"3⤵
- Executes dropped EXE
PID:1756
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3536 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5e40cb198ebcd20cd16739f670d4d7b74
SHA1e898a3b321bd6734c5a676382b5c0dfd42be377d
SHA2566cdc8d3c147dcf7253c0fb7bb552b4ae918aba4058cc072a2320a7297d4fbed7
SHA5121e5a68b2ae30c7d16a0a74807fa069be2d1b8adcfcbcde777217b9420a987196af13fb05177e476157029a1f7916e6948a1286cdb8957cdd142756da3c42beef