General
-
Target
havenewthingstounderstandwhichgivegreatthingsimeanbeautu=ifulthingseverfindedonearth____sheismygirlmywifemyheartsheis.doc
-
Size
76KB
-
Sample
240502-q3313acc39
-
MD5
0aba1094e29ed6d65fa5a8b1ec8c2e57
-
SHA1
5eb1d60525661ec561ae7e56ed2a5798c0462c1e
-
SHA256
45ba5f0e0f5ea330c12f0081f8861a75e65f2849e67038c6106930dd66543186
-
SHA512
2ed36b870531ea151290fea7942f4fed89e36a946e343b36134bae50f6d6b3a54902f25461ddf7d137d317bc81e30642379facf4b043c4a2191e8241a8d10eb5
-
SSDEEP
1536:CfcQtfa+Hc4YZJBQZCc45Wb/2Y0pRObbhIatQqJlioDfeMbKekD:ufa+Hc4YZJBQZV45Wb/qROb9IEJlioDO
Static task
static1
Behavioral task
behavioral1
Sample
havenewthingstounderstandwhichgivegreatthingsimeanbeautu=ifulthingseverfindedonearth____sheismygirlmywifemyheartsheis.rtf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
havenewthingstounderstandwhichgivegreatthingsimeanbeautu=ifulthingseverfindedonearth____sheismygirlmywifemyheartsheis.rtf
Resource
win10-20240404-en
Malware Config
Extracted
remcos
RemoteHost
sembe.duckdns.org:14645
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
nots.dat
-
keylog_flag
false
-
keylog_folder
note
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
Rmc-999Z97
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
havenewthingstounderstandwhichgivegreatthingsimeanbeautu=ifulthingseverfindedonearth____sheismygirlmywifemyheartsheis.doc
-
Size
76KB
-
MD5
0aba1094e29ed6d65fa5a8b1ec8c2e57
-
SHA1
5eb1d60525661ec561ae7e56ed2a5798c0462c1e
-
SHA256
45ba5f0e0f5ea330c12f0081f8861a75e65f2849e67038c6106930dd66543186
-
SHA512
2ed36b870531ea151290fea7942f4fed89e36a946e343b36134bae50f6d6b3a54902f25461ddf7d137d317bc81e30642379facf4b043c4a2191e8241a8d10eb5
-
SSDEEP
1536:CfcQtfa+Hc4YZJBQZCc45Wb/2Y0pRObbhIatQqJlioDfeMbKekD:ufa+Hc4YZJBQZV45Wb/qROb9IEJlioDO
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1