Analysis Overview
SHA256
6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550
Threat Level: Known bad
The file 6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe was found to be: Known bad.
Malicious Activity Summary
Remcos
AutoIT Executable
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-15 09:36
Signatures
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-15 09:36
Reported
2024-08-15 09:39
Platform
win7-20240708-en
Max time kernel
122s
Max time network
124s
Command Line
Signatures
System Location Discovery: System Language Discovery
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
Network
Files
memory/2092-11-0x0000000000120000-0x0000000000124000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\polygamodioecious
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Temp\neophobic
| MD5 | 5078da5a6edbf3f2717e3c42f104653a |
| SHA1 | 149826b6633e609c981db238ba6f78763f19a8a0 |
| SHA256 | 2ff0969fd4aa99e24e0de68dc1680419bd1d8ac171ce7642f19fc53ef5c9bf43 |
| SHA512 | 02c5a0bb8c022c94d501ec9250e80b5d88e44c775bd3cc9ff3cbd2de4bd327d48f3562593b195e87f97f1ebf5bb10bcb40f4334b64513f2fc5c00724de045096 |
C:\Users\Admin\AppData\Local\Temp\autFF84.tmp
| MD5 | 743c7721cae039db88b61e8ec3bb55ac |
| SHA1 | a25b127bef654cd5337a4e356ff607ac047f9c5a |
| SHA256 | bd7d638fe2ded32ec393b8cf43607ddb6984e5346f1690bbed9aaeefe52444d9 |
| SHA512 | 079318fe0f73815408119b9009bd16a62dced9e9d532fdd0535d6ff1c0eaa2ef1e2f73478a5b0b079e43164b2b9ff51b38e1852490a662fda766a09ba3cee1aa |
C:\Users\Admin\AppData\Local\Temp\polygamodioecious
| MD5 | 10a0ee411d5dfad40b84ea6cb7c37f5a |
| SHA1 | 077f83b6254af8a729fc58315d5fd318122e5f83 |
| SHA256 | dae3463a4bc22fa2d45f482b3e1fa1403783b63c880a1da917ed0caa86830979 |
| SHA512 | bf4eae7b08be2385ecf8cb8d5b0e58034a6f3492ac07bef1c2245e6dfc8033e4aafbf845a66cbc9ab633930b1912da542d2aaa65a92240a2c125d3bb1683fdbc |
C:\Users\Admin\AppData\Local\Temp\autFF95.tmp
| MD5 | dd0b1108529f1cebafb549f579572a56 |
| SHA1 | 2e919facff6720bc9002ac6b41ff572ae1364e27 |
| SHA256 | a6e7e0192b5358843da1145c6ce24e9429af24c74d30a0c36c03adda79754a83 |
| SHA512 | ad2435dad9bfe76f588ebb23ac39a604ef2d1cf264c08d267de3889d4e0cba4fd8d558fabbd09d09bde05d52388ea1e42bdecd2af27e4fb8f2c001104722a805 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-15 09:36
Reported
2024-08-15 09:39
Platform
win10v2004-20240802-en
Max time kernel
149s
Max time network
146s
Command Line
Signatures
Remcos
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
| US | 8.8.8.8:53 | www.vipclassproject2024.space | udp |
Files
memory/1424-11-0x0000000002220000-0x0000000002224000-memory.dmp
memory/1424-12-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1424-13-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1424-16-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1424-17-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1424-20-0x0000000000400000-0x0000000000482000-memory.dmp
C:\ProgramData\manpi\logs.dat
| MD5 | e965cdd988d60be7e67a59e97777bd82 |
| SHA1 | 5fb9dd39dcdd30ad26212ec1a3247cc8e9652063 |
| SHA256 | 9d88f6d7fe3d189ae0c0d750036d3371d2cb68eb8016408172d893b84c121720 |
| SHA512 | 39c677f98a95117af2356a5d80abf889b908cd44d8a11571b42d073d86d9c478dc0799e45328796a88273d43acc0f5a61f954b2954302b31f22f3729b9164866 |