Malware Analysis Report

2024-12-07 22:23

Sample ID 240417-p3gmdshd7w
Target e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682
SHA256 e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682
Tags
remotehost remcos
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682

Threat Level: Known bad

The file e54f171ba44e1007ce228fa12d46728bf01d90194efae9a537e590dcba84e682 was found to be: Known bad.

Malicious Activity Summary

remotehost remcos

Remcos family

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-17 12:51

Signatures

Remcos family

remcos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 12:51

Reported

2024-04-17 12:54

Platform

win10v2004-20240226-en

Max time kernel

161s

Max time network

169s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2960 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxms.duckdns.org udp
US 89.117.23.25:57832 rxms.duckdns.org tcp
US 8.8.8.8:53 57.40.53.23.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
GB 142.250.187.202:443 tcp
US 8.8.8.8:53 25.23.117.89.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 65.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 4.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 153.141.79.40.in-addr.arpa udp

Files

C:\ProgramData\remcos\logs.dat

MD5 744f11db083fe683be7c0012e1675b7a
SHA1 a97f69d32cc6c7ee739bc92a0391be823ed99b05
SHA256 6505a28787c4c58c400c5db002fbf3b4f39fc8e3d8f6bb61841bed945c4923eb
SHA512 f3b61b7dfcf856145d72f7b1c627f359773d4ed3e79b5171a30606847cf34ade5679705b99a67ab8c30a0fba8067e854e3d04758049ce232a409d1c2c0c64d60

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 12:51

Reported

2024-04-17 12:53

Platform

win7-20231129-en

Max time kernel

147s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe

"C:\Users\Admin\AppData\Local\Temp\3ae2a8fcc969ec131e6ea2387dbdbdc6dd9ef216fc4a04990a403b7a38494778.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 rxms.duckdns.org udp
US 89.117.23.25:57832 rxms.duckdns.org tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp

Files

C:\ProgramData\remcos\logs.dat

MD5 37b19a76bfa5509f5e7b7bc57c7d4eba
SHA1 9e1acabda05d052a5d061702c0985bf0cbf836cc
SHA256 cc11ceb2a0b2861d1b1897601bb83cb0502accef89197390262d48ddd2e3efde
SHA512 c2925bc72df90d7e88504d7b2d4517308aaa63e385e3b2048cdef5e8f98c733296be56655f66b24e6b5b768da92be71ebace94821fb258f9bd4d816442be0094