Overview
overview
10Static
static
101PDF.Fatur...07.exe
windows11-21h2-x64
83e6642f710...5e.exe
windows11-21h2-x64
104c40337094...92.exe
windows11-21h2-x64
10644d928a4a...25.exe
windows11-21h2-x64
1064ec6562b9...2e.exe
windows11-21h2-x64
107a0395c75a...8e.exe
windows11-21h2-x64
10901478668c...d4.exe
windows11-21h2-x64
10938b7e042b...98.exe
windows11-21h2-x64
1096d1bc7dec...b7.exe
windows11-21h2-x64
10Built.exe
windows11-21h2-x64
8DHL_PT5638...53.bat
windows11-21h2-x64
8DTLite.exe
windows11-21h2-x64
10PDF.Fatura...07.exe
windows11-21h2-x64
8PDF.exe
windows11-21h2-x64
10SIP.03746.XSLSX.exe
windows11-21h2-x64
8a33245a27c...8a.exe
windows11-21h2-x64
10arwbjuh.exe
windows11-21h2-x64
10bjutbht.exe
windows11-21h2-x64
10black.bat
windows11-21h2-x64
8borlndmm.dll
windows11-21h2-x64
10ccleaner.exe
windows11-21h2-x64
1d87e2dcd2e...6d.exe
windows11-21h2-x64
10dwvhgtd.exe
windows11-21h2-x64
10file.exe
windows11-21h2-x64
10helper.bat
windows11-21h2-x64
10setup.exe
windows11-21h2-x64
7Resubmissions
21-01-2025 13:35
250121-qvptgawqbk 1021-01-2025 11:58
250121-n5b91ssqem 1021-01-2025 11:44
250121-nwlr4a1qhs 1021-01-2025 11:07
250121-m7zbws1kfn 1017-07-2024 20:08
240717-ywvp4swhjk 10Analysis
-
max time kernel
60s -
max time network
36s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-07-2024 20:08
Behavioral task
behavioral1
Sample
1PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
Built.exe
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
DTLite.exe
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
PDF.exe
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
SIP.03746.XSLSX.exe
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
arwbjuh.exe
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
bjutbht.exe
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
black.bat
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
borlndmm.dll
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
ccleaner.exe
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
d87e2dcd2eb9763552645a34218696143fa99ac7b5173dcd04889ce9f5ddf96d.exe
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
dwvhgtd.exe
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
file.exe
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
helper.bat
Resource
win11-20240709-en
Behavioral task
behavioral26
Sample
setup.exe
Resource
win11-20240709-en
General
-
Target
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
-
Size
1.9MB
-
MD5
c318036044f10d288cedac36d81a611b
-
SHA1
442245535cd0c4876f784a28fdbf6a32bb70e220
-
SHA256
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598
-
SHA512
6043678915f0893b3fbca5633dc1effe2e27d0f25eb1da413b14b93aa4204334b8792fee3e67bbfc905cc0130748afbec6fc6aaf834fe7c168a430bd06d769da
-
SSDEEP
24576:MDXpgvsPjx71gWufN62I520/hjlB6iTzKF+iZpWWt5YY7tOvkIOTUQvb7Mhh21:MDevYxSNudSrZpWKd7tOvJOpb7K81
Malware Config
Extracted
remcos
4.9.3 Light
RemoteHost
127.0.0.1:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-52SPIJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1924 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1924 2840 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe 82 PID 2840 wrote to memory of 1924 2840 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe 82 PID 2840 wrote to memory of 1924 2840 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe 82 PID 2840 wrote to memory of 1924 2840 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe 82 PID 2840 wrote to memory of 1924 2840 938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe"C:\Users\Admin\AppData\Local\Temp\938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe"C:\Users\Admin\AppData\Local\Temp\938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1924
-