Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
GST Certificate.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GST Certificate.exe
Resource
win10v2004-20240226-en
General
-
Target
GST Certificate.exe
-
Size
624KB
-
MD5
dbf4b372a3908f1474045ee2ebd99688
-
SHA1
551ac7acf871beb4eed8218628c7d79e72cd1487
-
SHA256
febaf2e4a4f46a0d9cde131025f1ef3106dbf8589a0af7758d3893f9b602f2a8
-
SHA512
2f546b3c5ba52d891bf7ddd3586bd446c4dd608667a83ce81a551da70420facb474b3d3ff9303e7c184f5731318db5758bd0ad8639ad4eb6ca0f7c44dafe1633
-
SSDEEP
12288:XZNR4EoOBKMNHlgkk5B5sf6ypaU0vyG2LGcJmcMmlfW189Jmw6EAmD:RoOBrBltckSypaHvy/dO1T
Malware Config
Extracted
remcos
1.7 Pro
Host
104.254.90.187:9704
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
team
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_vseandhklfzfgjj
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2452 remcos.exe 1828 remcos.exe -
Loads dropped DLL 1 IoCs
pid Process 2664 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" GST Certificate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2872 set thread context of 2428 2872 GST Certificate.exe 34 PID 2452 set thread context of 1828 2452 remcos.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe 1312 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2840 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2872 GST Certificate.exe 2872 GST Certificate.exe 2644 powershell.exe 2616 powershell.exe 2452 remcos.exe 592 powershell.exe 588 powershell.exe 2452 remcos.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2872 GST Certificate.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2452 remcos.exe Token: SeDebugPrivilege 592 powershell.exe Token: SeDebugPrivilege 588 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 remcos.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2616 2872 GST Certificate.exe 28 PID 2872 wrote to memory of 2616 2872 GST Certificate.exe 28 PID 2872 wrote to memory of 2616 2872 GST Certificate.exe 28 PID 2872 wrote to memory of 2616 2872 GST Certificate.exe 28 PID 2872 wrote to memory of 2644 2872 GST Certificate.exe 30 PID 2872 wrote to memory of 2644 2872 GST Certificate.exe 30 PID 2872 wrote to memory of 2644 2872 GST Certificate.exe 30 PID 2872 wrote to memory of 2644 2872 GST Certificate.exe 30 PID 2872 wrote to memory of 2880 2872 GST Certificate.exe 32 PID 2872 wrote to memory of 2880 2872 GST Certificate.exe 32 PID 2872 wrote to memory of 2880 2872 GST Certificate.exe 32 PID 2872 wrote to memory of 2880 2872 GST Certificate.exe 32 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2872 wrote to memory of 2428 2872 GST Certificate.exe 34 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2428 wrote to memory of 2664 2428 GST Certificate.exe 35 PID 2664 wrote to memory of 2840 2664 cmd.exe 37 PID 2664 wrote to memory of 2840 2664 cmd.exe 37 PID 2664 wrote to memory of 2840 2664 cmd.exe 37 PID 2664 wrote to memory of 2840 2664 cmd.exe 37 PID 2664 wrote to memory of 2452 2664 cmd.exe 38 PID 2664 wrote to memory of 2452 2664 cmd.exe 38 PID 2664 wrote to memory of 2452 2664 cmd.exe 38 PID 2664 wrote to memory of 2452 2664 cmd.exe 38 PID 2452 wrote to memory of 592 2452 remcos.exe 39 PID 2452 wrote to memory of 592 2452 remcos.exe 39 PID 2452 wrote to memory of 592 2452 remcos.exe 39 PID 2452 wrote to memory of 592 2452 remcos.exe 39 PID 2452 wrote to memory of 588 2452 remcos.exe 41 PID 2452 wrote to memory of 588 2452 remcos.exe 41 PID 2452 wrote to memory of 588 2452 remcos.exe 41 PID 2452 wrote to memory of 588 2452 remcos.exe 41 PID 2452 wrote to memory of 1312 2452 remcos.exe 42 PID 2452 wrote to memory of 1312 2452 remcos.exe 42 PID 2452 wrote to memory of 1312 2452 remcos.exe 42 PID 2452 wrote to memory of 1312 2452 remcos.exe 42 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45 PID 2452 wrote to memory of 1828 2452 remcos.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\GST Certificate.exe"C:\Users\Admin\AppData\Local\Temp\GST Certificate.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\GST Certificate.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FxeJGDxcWPISK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FxeJGDxcWPISK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp736B.tmp"2⤵
- Creates scheduled task(s)
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\GST Certificate.exe"C:\Users\Admin\AppData\Local\Temp\GST Certificate.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FxeJGDxcWPISK.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FxeJGDxcWPISK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpABF8.tmp"5⤵
- Creates scheduled task(s)
PID:1312
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD576c1687d97dfdbcea62ef1490bec5001
SHA15f4d1aeafa7d840cde67b76f97416dd68efd1bed
SHA25679f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4
SHA512da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925
-
Filesize
1KB
MD52c9f8940037fab31bfeaab55956f5477
SHA146a415ef76658955554298862051e03442fda737
SHA256c214d0d083a3386ce815f0677fb6012a03af7549e983d4b2b2f725027bc32fca
SHA5128c056fd8060622c218e21d4f3396900fdaa3d8e1cc185bca14f4de97f68911845478b0c45a85295d28cadba0341157a9c64a3340f62f8bdec1a4cffc2a14b882
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PF8VSGSE788NSK1T2UGN.temp
Filesize7KB
MD5c300338df47d2e0480e19b74b73f5325
SHA15b93354b438a782d4cce9470aab5c7c6290e4ecb
SHA25624fda01120a73074a1ab2729575e3e4c3390fa854f027b5d24c1376f7b2fd44e
SHA512b3c48ef8a6daa94ef19bc0d343824cfd715f229f614525130da87601ef250cfece10a27cf73714fa5737550d90abac83713b18756a515056b8f6f1ba9347ad1a
-
Filesize
624KB
MD5dbf4b372a3908f1474045ee2ebd99688
SHA1551ac7acf871beb4eed8218628c7d79e72cd1487
SHA256febaf2e4a4f46a0d9cde131025f1ef3106dbf8589a0af7758d3893f9b602f2a8
SHA5122f546b3c5ba52d891bf7ddd3586bd446c4dd608667a83ce81a551da70420facb474b3d3ff9303e7c184f5731318db5758bd0ad8639ad4eb6ca0f7c44dafe1633