Resubmissions
14/05/2024, 09:47
240514-lsl8caag51 1014/05/2024, 09:47
240514-lsbfvabb68 1023/04/2024, 13:16
240423-qhzsxagf46 10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
MLD.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
MLD.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
g2m.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
g2m.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
myrecentfiles.lnk
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
myrecentfiles.lnk
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
winsys.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
winsys.exe
Resource
win10v2004-20240226-en
General
-
Target
myrecentfiles.lnk
-
Size
2KB
-
MD5
f76cb7bb3dcc0fa8dfeb0d8b23f47e61
-
SHA1
5ecaf84cc9742518bd27d29b8e3d401ca9f0af4b
-
SHA256
8e7eb07f9e6ff4d5e7db3dcf8bcbf909693cce12693a43c1ddd8b221cdf3a9e8
-
SHA512
b018e2b989935f1ecb35eb41855027791aee5900e679a5bf5836eaef8a6456946b9289b6b37f8c92af3a95008109633583d55f13f8c3a0df3a76b13c0a835bbb
Malware Config
Extracted
remcos
4.9.4 Pro
RemoteHost
69.174.100.12:5009
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-T52Q4O
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4108 powershell.exe 4108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4108 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4444 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4444 AcroRd32.exe 4444 AcroRd32.exe 4444 AcroRd32.exe 4444 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 4108 2920 cmd.exe 88 PID 2920 wrote to memory of 4108 2920 cmd.exe 88 PID 4108 wrote to memory of 4652 4108 powershell.exe 89 PID 4108 wrote to memory of 4652 4108 powershell.exe 89 PID 4652 wrote to memory of 4636 4652 cmd.exe 90 PID 4652 wrote to memory of 4636 4652 cmd.exe 90 PID 4652 wrote to memory of 4636 4652 cmd.exe 90 PID 4652 wrote to memory of 4444 4652 cmd.exe 91 PID 4652 wrote to memory of 4444 4652 cmd.exe 91 PID 4652 wrote to memory of 4444 4652 cmd.exe 91 PID 4444 wrote to memory of 8 4444 AcroRd32.exe 102 PID 4444 wrote to memory of 8 4444 AcroRd32.exe 102 PID 4444 wrote to memory of 8 4444 AcroRd32.exe 102 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 3112 8 RdrCEF.exe 103 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104 PID 8 wrote to memory of 4908 8 RdrCEF.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\myrecentfiles.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c "cmd /c 'start .\winsys.odt & start .\MLD.pdf'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "start .\winsys.odt & start .\MLD.pdf"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\winsys.odt.\winsys.odt4⤵PID:4636
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MLD.pdf"4⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140435⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=39CC57C6CD4EFD78E0F8B354C451E4B9 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:3112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7F79639D2C52D81EB5BF92F88971B0C3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7F79639D2C52D81EB5BF92F88971B0C3 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:16⤵PID:4908
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=116B4AA82916FC8D496D8644DEAC4E81 --mojo-platform-channel-handle=2184 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:1880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DF7684957A948642812D1F949BDFBC94 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DF7684957A948642812D1F949BDFBC94 --renderer-client-id=5 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job /prefetch:16⤵PID:1012
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6DE53B9C4BC9B15473E80EB3B70DE7E9 --mojo-platform-channel-handle=2584 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:3488
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BE1DF6C60F2558A6DFA738D039DAC24A --mojo-platform-channel-handle=1860 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:4948
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD596d0b11fef5fc19b961b45fcc28613e7
SHA1911b2c989099555f77fc13721a6c3aea80f35ce4
SHA256f09778ab92bb23c599127e93a13cb1c78657d821576765af4668dbafeba301df
SHA512d0826aeee7b7de80ca39b08241f47cc98197a6e53ac2f2b37b3f38c196509c5378672e4054db43bf0a03f0d19668e5c8108586073c5fe615b153330568bc5c6a
-
Filesize
64KB
MD5186a0ac250f0a37567acd67df8b49dc3
SHA157c741c03f995c6ddea8fdb88622af29a8224f99
SHA256776a0d628aaa19c2b160aadac6f35f2eaf391f128787476bcac02336d4978261
SHA5125ecc6732a69d33293bc12b39c74e0ee6dba6288d511672db28bd512ec230124a85fa9cee0b2ce326b6b0db1267b5118dc124cf8acadf939cca6b265f53635e5c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82