Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20240705-en
General
-
Target
Request for Quotation.exe
-
Size
942KB
-
MD5
81f320c7d5f344ae0ddd2b05c69efb78
-
SHA1
dcfae138ee23d9cea53a052cfe3c42e87c1873e5
-
SHA256
de99d33baf08708519ab2d9dc15635280482b2b21e52653b8786a6eb34c2f262
-
SHA512
cb94f64fd7979917ba1d32a3966e22e9afce0766f58cf15e23a7f1a00d6b2f7cfd1e9b07edcd4c76e7471d89690d142e1ddaa23ea09d95b0f9eb17517d9189e7
-
SSDEEP
24576:BYeOKhefMa86dA+CPcwh/6s7TNNuS6UEtvqsX+ES:2trdsEE/6mNNuS6UEtvHO
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-X3UMUO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2868 powershell.exe 2768 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 2780 1744 Request for Quotation.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 powershell.exe 2768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2868 1744 Request for Quotation.exe 30 PID 1744 wrote to memory of 2868 1744 Request for Quotation.exe 30 PID 1744 wrote to memory of 2868 1744 Request for Quotation.exe 30 PID 1744 wrote to memory of 2868 1744 Request for Quotation.exe 30 PID 1744 wrote to memory of 2768 1744 Request for Quotation.exe 32 PID 1744 wrote to memory of 2768 1744 Request for Quotation.exe 32 PID 1744 wrote to memory of 2768 1744 Request for Quotation.exe 32 PID 1744 wrote to memory of 2768 1744 Request for Quotation.exe 32 PID 1744 wrote to memory of 2136 1744 Request for Quotation.exe 34 PID 1744 wrote to memory of 2136 1744 Request for Quotation.exe 34 PID 1744 wrote to memory of 2136 1744 Request for Quotation.exe 34 PID 1744 wrote to memory of 2136 1744 Request for Quotation.exe 34 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36 PID 1744 wrote to memory of 2780 1744 Request for Quotation.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ToHYZKAyCCa.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ToHYZKAyCCa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB339.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD566df24304a56908ca7df16228e7e66e8
SHA1872239db3cb40f6427e3809515ebb5240426302e
SHA25666ac22fdada4b24319b8e0176cfbd54aaf6d65557c4e46ea64fc585964484543
SHA5122ca4e7053c817de14b46ec4f53aee48a6f9503d8c697726a6953407b751923904583340b059ecd08e93b5086c6140d4e3d46a8a091d14ec6fb919d1ce2b1d73a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fe36c3fe82f0e90e8d1bbab2a3224d9c
SHA1da753849266002222c3bdef22797084cb9dc47ce
SHA256f31fbcc1169edfeb052b3d1611f616dc8978cce376c44a801d4390b01c9a5b18
SHA512ba3a9d612d8726ac01f4edd2e6fe684de288d1c519fb349e38583a4bae9c9ca29a98e84fb21f6665b8c6f50dd94c309e69b7bb869c02191e708766cddd322e29