Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
APERTURA RAD 10000065665655.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
APERTURA RAD 10000065665655.exe
Resource
win10v2004-20240730-en
General
-
Target
APERTURA RAD 10000065665655.exe
-
Size
2.3MB
-
MD5
fc82c4456949b5f4dfc28f271be666b0
-
SHA1
a2bdc71c58f29338cdb80edc7099caf24c1de8bd
-
SHA256
90bbc186938b8bf66f288b9376a9ee09e3ea004231d79e29eac556060cd7f6a3
-
SHA512
a691497d78457a6da0eea34df574f9baa9d1b3414a3c2e02998799596dadf718dfd968ed81eaeb3817862b59428b47bd12be64c006ce374e0981310561903829
-
SSDEEP
49152:hEevijJYygFFqn2Eorzg89I4MdqnIhIuOcSnLp20aPbT+gyYlXtwL/Lal1w9LVw:h7aCFFqdHPP0YlXtwL/Lal1
Malware Config
Extracted
remcos
AMORE
muchodinerohoy.con-ip.com:1667
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-T2SV5Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TeamsUpdat = "C:\\Users\\Admin\\Pictures\\Teams\\TeamsUpdater.exe" APERTURA RAD 10000065665655.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APERTURA RAD 10000065665655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language APERTURA RAD 10000065665655.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 APERTURA RAD 10000065665655.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4184 3936 APERTURA RAD 10000065665655.exe 86 PID 3936 wrote to memory of 4184 3936 APERTURA RAD 10000065665655.exe 86 PID 3936 wrote to memory of 4184 3936 APERTURA RAD 10000065665655.exe 86 PID 3936 wrote to memory of 4184 3936 APERTURA RAD 10000065665655.exe 86 PID 3936 wrote to memory of 4184 3936 APERTURA RAD 10000065665655.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"C:\Users\Admin\AppData\Local\Temp\APERTURA RAD 10000065665655.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD527193a2286bc7d6aec0ddc04362711eb
SHA1d8056a7838b268d1eccf570d4cf4755f819caf76
SHA256ffb0ff6b769584b7a32bd35829924a95e5d8cba55a908b902dffae1b3c6601ed
SHA512af297e967345837ee992ab088a38cc32d2ec336ab9b1ceab985797d674fbde5889d77bed53ccc789a8c77685366c9c5bc583f03c9cc2fb8d25b2c456604837b8