Malware Analysis Report

2024-12-07 22:29

Sample ID 240405-q9hnpsdh2s
Target 1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.dat-decoded
SHA256 2d35feecb9b427d2f48f6fd0dd5ef71eb7ba75fe024d7c6f9067490bbabc3c17
Tags
remotehost remcos
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2d35feecb9b427d2f48f6fd0dd5ef71eb7ba75fe024d7c6f9067490bbabc3c17

Threat Level: Known bad

The file 1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.dat-decoded was found to be: Known bad.

Malicious Activity Summary

remotehost remcos

Remcos family

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-05 13:57

Signatures

Remcos family

remcos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-05 13:57

Reported

2024-04-05 14:00

Platform

win7-20240221-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe

"C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 4637d70964e16247d1831860bdb056a2
SHA1 151bcc48749a5e7c66c6c8655f44a22aa8752921
SHA256 26ee4760cba02f9235cd76bcd4f0b7fd146d7c97c6b41f0492695c7eb7d0fb6e
SHA512 1e6cd1baa5ca83f664b5414363c58c89e89b0bc2ddb35a68b0260f35b2d82b15f74ba7e6fff5da876cba07f50112c3276749f82878dbeb1a04f550e426a1706c

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-05 13:57

Reported

2024-04-05 14:00

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe

"C:\Users\Admin\AppData\Local\Temp\1712325246e9ef467ca10a8bb47cc22f360faab318b2059a09a5a7d0c76937a79cfb2a74b2831.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 96.136.73.23.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 24.139.73.23.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 160.136.73.23.in-addr.arpa udp
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 107.136.73.23.in-addr.arpa udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 8.8.8.8:53 rxmz.duckdns.org udp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp
US 89.117.23.22:57833 rxmz.duckdns.org tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 dc4106402745fb59b5d40dfac5268d44
SHA1 ad7fbc041d1e74818d0c159dcdbffa58237f6bac
SHA256 feddccf93dfd02aeaf9025fe296320d32e231890e8f054291da75c51d720b515
SHA512 3fa7c90b6e8905adce1df116ef413839cb88c0ece7c61b8d2e5a8e4da18f7a1be67da1bc6f5fd4bf9a0a14e820e1866f50f7d453c792b5ef90fb1eab394aa351