Overview
overview
10Static
static
101PDF.Fatur...07.exe
windows11-21h2-x64
83e6642f710...5e.exe
windows11-21h2-x64
104c40337094...92.exe
windows11-21h2-x64
10644d928a4a...25.exe
windows11-21h2-x64
1064ec6562b9...2e.exe
windows11-21h2-x64
107a0395c75a...8e.exe
windows11-21h2-x64
10901478668c...d4.exe
windows11-21h2-x64
10938b7e042b...98.exe
windows11-21h2-x64
1096d1bc7dec...b7.exe
windows11-21h2-x64
10Built.exe
windows11-21h2-x64
8DHL_PT5638...53.bat
windows11-21h2-x64
8DTLite.exe
windows11-21h2-x64
10PDF.Fatura...07.exe
windows11-21h2-x64
8PDF.exe
windows11-21h2-x64
10SIP.03746.XSLSX.exe
windows11-21h2-x64
8a33245a27c...8a.exe
windows11-21h2-x64
10arwbjuh.exe
windows11-21h2-x64
10bjutbht.exe
windows11-21h2-x64
10black.bat
windows11-21h2-x64
8borlndmm.dll
windows11-21h2-x64
10ccleaner.exe
windows11-21h2-x64
1d87e2dcd2e...6d.exe
windows11-21h2-x64
10dwvhgtd.exe
windows11-21h2-x64
10file.exe
windows11-21h2-x64
10helper.bat
windows11-21h2-x64
10setup.exe
windows11-21h2-x64
7Resubmissions
21-01-2025 13:35
250121-qvptgawqbk 1021-01-2025 11:58
250121-n5b91ssqem 1021-01-2025 11:44
250121-nwlr4a1qhs 1021-01-2025 11:07
250121-m7zbws1kfn 1017-07-2024 20:08
240717-ywvp4swhjk 10Analysis
-
max time kernel
60s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-07-2024 20:08
Behavioral task
behavioral1
Sample
1PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
Built.exe
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
DTLite.exe
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
PDF.exe
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
SIP.03746.XSLSX.exe
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
arwbjuh.exe
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
bjutbht.exe
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
black.bat
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
borlndmm.dll
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
ccleaner.exe
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
d87e2dcd2eb9763552645a34218696143fa99ac7b5173dcd04889ce9f5ddf96d.exe
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
dwvhgtd.exe
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
file.exe
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
helper.bat
Resource
win11-20240709-en
Behavioral task
behavioral26
Sample
setup.exe
Resource
win11-20240709-en
General
-
Target
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
-
Size
1.9MB
-
MD5
2121a055e132df9c2b62d3ad578faa85
-
SHA1
60439cb5d41f2256eb54bbd1d84d8d04d78272ef
-
SHA256
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a
-
SHA512
55039a343efd737a7488193f777ca0a44dc465f098e51241d8a0699478d72dda9f5eb8bb204e96cc81da14191475e1ff87132680ac4b5956cb1b85d06a4a6c71
-
SSDEEP
24576:kDLnN/pjx71gWufN62I520/hjlB6iTzKF+iZpWSsZrKp0HqGmyejFyzXYVN4on59:kDLn7xSNudSrZpWLwG8bvn59
Malware Config
Extracted
remcos
4.9.3 Light
RemoteHost
127.0.0.1:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-52SPIJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2156 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2156 3764 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe 82 PID 3764 wrote to memory of 2156 3764 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe 82 PID 3764 wrote to memory of 2156 3764 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe 82 PID 3764 wrote to memory of 2156 3764 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe 82 PID 3764 wrote to memory of 2156 3764 a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe"C:\Users\Admin\AppData\Local\Temp\a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe"C:\Users\Admin\AppData\Local\Temp\a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156
-