Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
APERTURA RAD 10000065665655.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
APERTURA RAD 10000065665655.exe
Resource
win10v2004-20240730-en
General
-
Target
APERTURA RAD 10000065665655.exe
-
Size
2.3MB
-
MD5
fc82c4456949b5f4dfc28f271be666b0
-
SHA1
a2bdc71c58f29338cdb80edc7099caf24c1de8bd
-
SHA256
90bbc186938b8bf66f288b9376a9ee09e3ea004231d79e29eac556060cd7f6a3
-
SHA512
a691497d78457a6da0eea34df574f9baa9d1b3414a3c2e02998799596dadf718dfd968ed81eaeb3817862b59428b47bd12be64c006ce374e0981310561903829
-
SSDEEP
49152:hEevijJYygFFqn2Eorzg89I4MdqnIhIuOcSnLp20aPbT+gyYlXtwL/Lal1w9LVw:h7aCFFqdHPP0YlXtwL/Lal1
Malware Config
Extracted
remcos
AMORE
muchodinerohoy.con-ip.com:1667
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-T2SV5Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\TeamsUpdat = "C:\\Users\\Admin\\Pictures\\Teams\\TeamsUpdater.exe" APERTURA RAD 10000065665655.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APERTURA RAD 10000065665655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APERTURA RAD 10000065665655.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2416 APERTURA RAD 10000065665655.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30 PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30 PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30 PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30 PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30 PID 2232 wrote to memory of 2416 2232 APERTURA RAD 10000065665655.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5f061a50885e3a9aee40ecf880cb3de23
SHA1381bece41c977c517c856a11027fd23461b136ad
SHA2562340a14545b5f9253fe70c3a58547819561050ac4c5d1c27fc8b873ca3dfa077
SHA5121bcf4fe4ee6624eb111e6438b750f96c8566416bd256a6395e9956eee643518aebc5d36d374048856b85953cadf5871f40fa76462b90159fca8b9073c5b9db43