Malware Analysis Report

2024-12-07 22:31

Sample ID 240405-q9hzgaec94
Target 1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.dat-decoded
SHA256 0f1d1af792a1caad8e0dc9a9057d7a3b06ed85f34672cdfec64aab4785c97383
Tags
remotehost remcos
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f1d1af792a1caad8e0dc9a9057d7a3b06ed85f34672cdfec64aab4785c97383

Threat Level: Known bad

The file 1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.dat-decoded was found to be: Known bad.

Malicious Activity Summary

remotehost remcos

Remcos family

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-05 13:57

Signatures

Remcos family

remcos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-05 13:57

Reported

2024-04-05 14:00

Platform

win7-20240221-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe

"C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 4637d70964e16247d1831860bdb056a2
SHA1 151bcc48749a5e7c66c6c8655f44a22aa8752921
SHA256 26ee4760cba02f9235cd76bcd4f0b7fd146d7c97c6b41f0492695c7eb7d0fb6e
SHA512 1e6cd1baa5ca83f664b5414363c58c89e89b0bc2ddb35a68b0260f35b2d82b15f74ba7e6fff5da876cba07f50112c3276749f82878dbeb1a04f550e426a1706c

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-05 13:57

Reported

2024-04-05 14:00

Platform

win10v2004-20240226-en

Max time kernel

151s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe

"C:\Users\Admin\AppData\Local\Temp\1712325245dd14de5ce8bd608ab9ed54b1036ba8bc99d838c1ed6d3361c8ac2ed8ec3c75ba394.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 139.136.73.23.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
GB 142.250.187.202:443 tcp
US 8.8.8.8:53 24.139.73.23.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 121.136.73.23.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 90.136.73.23.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 174.117.168.52.in-addr.arpa udp
US 89.117.23.22:57834 rzaz.duckdns.org tcp
US 8.8.8.8:53 rzaz.duckdns.org udp
US 89.117.23.22:57834 tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 dc97aef06667561ab8cfc8d3a88b026a
SHA1 f538bd595b2fd82424d203a1966b7a1d2705722d
SHA256 0ca7a4b3cd08b55763210042941c09be22221fa7164dbce8c2d309eb5a6b3deb
SHA512 be08326a95a662fa96473952a102512874718a4a84888ce8aed5a4744d3433c3c9a2b8f80bb5e38cf602cc736de72f54e4ca174c98fb76b900af7ffdcba21ffb