Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 1100-656-02.exe
Resource
win7-20231129-en
General
-
Target
RFQ 1100-656-02.exe
-
Size
856KB
-
MD5
a27c4215869da7c1f2121c54ec27549b
-
SHA1
f370447ada466a0db44bbd930e8517f79c35f0ba
-
SHA256
358f8d58da6f43e4cdb17fecc2e1fbb6a6492ca681d7c48080fd432ae834aa9c
-
SHA512
4b0c74606e1bc5422e21af49cfc433f71084661f4fbb5624efb57f46bcfdd916e3681ece8b28c343787fb1613e6791bef6ffca2f7ce1b1f140aa1cde7fffa556
-
SSDEEP
24576:j/odxK26kNtue9MTdBfW3HJfREKSPZYhkngIlBUKDWA:GrtuHBBUHJaPZYh3y3WA
Malware Config
Extracted
remcos
KY MIX
192.210.201.57:52499
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-M2GVTY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Processes:
RFQ 1100-656-02.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RFQ 1100-656-02.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
wab.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Processes:
RFQ 1100-656-02.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RFQ 1100-656-02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RFQ 1100-656-02.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RFQ 1100-656-02.exewab.exedescription pid process target process PID 2512 set thread context of 1752 2512 RFQ 1100-656-02.exe wab.exe PID 1752 set thread context of 2880 1752 wab.exe wab.exe PID 1752 set thread context of 676 1752 wab.exe wab.exe PID 1752 set thread context of 484 1752 wab.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exewab.exepid process 2860 powershell.exe 2880 wab.exe 2880 wab.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
wab.exepid process 1752 wab.exe 1752 wab.exe 1752 wab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exewab.exedescription pid process Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 484 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 1752 wab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RFQ 1100-656-02.exedescription pid process target process PID 2512 wrote to memory of 2860 2512 RFQ 1100-656-02.exe powershell.exe PID 2512 wrote to memory of 2860 2512 RFQ 1100-656-02.exe powershell.exe PID 2512 wrote to memory of 2860 2512 RFQ 1100-656-02.exe powershell.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2536 2512 RFQ 1100-656-02.exe ngen.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2556 2512 RFQ 1100-656-02.exe svchost.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2568 2512 RFQ 1100-656-02.exe csc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 2480 2512 RFQ 1100-656-02.exe calc.exe PID 2512 wrote to memory of 1896 2512 RFQ 1100-656-02.exe ilasm.exe PID 2512 wrote to memory of 1896 2512 RFQ 1100-656-02.exe ilasm.exe PID 2512 wrote to memory of 1896 2512 RFQ 1100-656-02.exe ilasm.exe PID 2512 wrote to memory of 1896 2512 RFQ 1100-656-02.exe ilasm.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe PID 2512 wrote to memory of 2288 2512 RFQ 1100-656-02.exe cmd.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
RFQ 1100-656-02.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RFQ 1100-656-02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 1100-656-02.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 1100-656-02.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ 1100-656-02.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"2⤵
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
-
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xbuthfkekjeoidhdxdiq"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\idamixvgyrwtkrvhoovrgdj"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\kxnwjqgamaoguxrlxzqlrqvtkg"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD5b4d35c2eeab701cc661fad92232def4e
SHA14153d625e4582f13671c4893c64ee35d506ac679
SHA256d4e6dcbd2f59a5bf3e733d64bdbcc1b1b1b66f282f763ab2eb28af04fbfebc65
SHA5126f134dbcd5ed741d729e6285d557c1f9d9b55575c2429a6adbc82bc667587db454d49f4fec927e2f81f7b343385365896aea1540390bb90307200bc20a8aeb69
-
C:\Users\Admin\AppData\Local\Temp\xbuthfkekjeoidhdxdiqFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
memory/2512-0-0x000007FEF5EE3000-0x000007FEF5EE4000-memory.dmpFilesize
4KB
-
memory/2512-1-0x0000000001180000-0x000000000118C000-memory.dmpFilesize
48KB
-
memory/2512-2-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmpFilesize
9.9MB
-
memory/2512-3-0x00000000003A0000-0x00000000003A6000-memory.dmpFilesize
24KB
-
memory/2512-4-0x0000000000A30000-0x0000000000B02000-memory.dmpFilesize
840KB
-
memory/2512-148-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmpFilesize
9.9MB
-
memory/2536-24-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-26-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-20-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-18-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-16-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-14-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-22-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2536-12-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2860-11-0x0000000001E70000-0x0000000001E78000-memory.dmpFilesize
32KB
-
memory/2860-10-0x000000001B680000-0x000000001B962000-memory.dmpFilesize
2.9MB
-
memory/2860-9-0x0000000002F30000-0x0000000002FB0000-memory.dmpFilesize
512KB