Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
PR18213.exe
Resource
win7-20240221-en
General
-
Target
PR18213.exe
-
Size
386KB
-
MD5
111ec3b664493425244001508fe4da9f
-
SHA1
50ed10f291611c37cf1cf8fab9d1acd3ebc676a7
-
SHA256
547a1a1d08381d2103c9ef6bd7f1bb68783a8d788dd7b336ddca3fbad3684f53
-
SHA512
a5ce5f334220d3752ad12ae83dbada665c9fdcc020f207ab80280b23e95a99b55605e0fd7426881b45a27fdf4f0e5d0b9e0acd1db283b5474fe99f989ed6a7a5
-
SSDEEP
6144:TgL8GT9VZcXXALLbrcYz0beRXNXSMMlUvE9XypnsFjvj8ldXIR81I+bz:0P7UX6YtClNXSWHdsRbWXIRg
Malware Config
Extracted
remcos
december
91.92.243.110:3734
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QGHS48
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 15 IoCs
Processes:
resource yara_rule behavioral1/memory/272-3-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-5-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-9-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-14-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-17-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-19-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-23-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-26-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-28-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-31-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-35-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-38-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-40-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-43-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM behavioral1/memory/272-47-0x0000000000400000-0x0000000000882000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PR18213.exepid process 272 PR18213.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD5663000db9c1b74258716b0a19ffbf235
SHA171f50cb0847c52d04451e199cf35a4ea659f0a54
SHA25640d0929b74d5fb92c059e4fcc33bf3ed2003046d067f6ca55c6e209e6b6ac451
SHA512a6699f242da9aac43a3917fca6b064ab8f046d5b768a8f98994359aa489633b74d007605e19685bb1777c89303f0cda46b5ae96ac01a61c9b8fee29e1e111329
-
memory/272-19-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-47-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-17-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-9-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-10-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/272-11-0x0000000000890000-0x000000000090A000-memory.dmpFilesize
488KB
-
memory/272-2-0x0000000000890000-0x000000000090A000-memory.dmpFilesize
488KB
-
memory/272-14-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-5-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-3-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-26-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-23-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-28-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-31-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-35-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-38-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-40-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-43-0x0000000000400000-0x0000000000882000-memory.dmpFilesize
4.5MB
-
memory/272-1-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB