Malware Analysis Report

2025-01-02 03:08

Sample ID 240815-lk8fls1drq
Target 6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
SHA256 6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550
Tags
discovery remcos remotehost rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550

Threat Level: Known bad

The file 6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe was found to be: Known bad.

Malicious Activity Summary

discovery remcos remotehost rat

Remcos

AutoIT Executable

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-15 09:36

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-15 09:36

Reported

2024-08-15 09:39

Platform

win7-20240708-en

Max time kernel

122s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2092 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2092 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2092 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2092 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2668 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2668 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2668 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2668 wrote to memory of 1544 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1544 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1544 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1544 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1544 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2656 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2656 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2656 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2656 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2620 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2620 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2620 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2620 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1704 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1704 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1704 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 1704 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2208 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2208 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2208 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe
PID 2208 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

Network

N/A

Files

memory/2092-11-0x0000000000120000-0x0000000000124000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\polygamodioecious

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\neophobic

MD5 5078da5a6edbf3f2717e3c42f104653a
SHA1 149826b6633e609c981db238ba6f78763f19a8a0
SHA256 2ff0969fd4aa99e24e0de68dc1680419bd1d8ac171ce7642f19fc53ef5c9bf43
SHA512 02c5a0bb8c022c94d501ec9250e80b5d88e44c775bd3cc9ff3cbd2de4bd327d48f3562593b195e87f97f1ebf5bb10bcb40f4334b64513f2fc5c00724de045096

C:\Users\Admin\AppData\Local\Temp\autFF84.tmp

MD5 743c7721cae039db88b61e8ec3bb55ac
SHA1 a25b127bef654cd5337a4e356ff607ac047f9c5a
SHA256 bd7d638fe2ded32ec393b8cf43607ddb6984e5346f1690bbed9aaeefe52444d9
SHA512 079318fe0f73815408119b9009bd16a62dced9e9d532fdd0535d6ff1c0eaa2ef1e2f73478a5b0b079e43164b2b9ff51b38e1852490a662fda766a09ba3cee1aa

C:\Users\Admin\AppData\Local\Temp\polygamodioecious

MD5 10a0ee411d5dfad40b84ea6cb7c37f5a
SHA1 077f83b6254af8a729fc58315d5fd318122e5f83
SHA256 dae3463a4bc22fa2d45f482b3e1fa1403783b63c880a1da917ed0caa86830979
SHA512 bf4eae7b08be2385ecf8cb8d5b0e58034a6f3492ac07bef1c2245e6dfc8033e4aafbf845a66cbc9ab633930b1912da542d2aaa65a92240a2c125d3bb1683fdbc

C:\Users\Admin\AppData\Local\Temp\autFF95.tmp

MD5 dd0b1108529f1cebafb549f579572a56
SHA1 2e919facff6720bc9002ac6b41ff572ae1364e27
SHA256 a6e7e0192b5358843da1145c6ce24e9429af24c74d30a0c36c03adda79754a83
SHA512 ad2435dad9bfe76f588ebb23ac39a604ef2d1cf264c08d267de3889d4e0cba4fd8d558fabbd09d09bde05d52388ea1e42bdecd2af27e4fb8f2c001104722a805

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-15 09:36

Reported

2024-08-15 09:39

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

Signatures

Remcos

rat remcos

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe

"C:\Users\Admin\AppData\Local\Temp\6610fa5fa05c6918011ca2ea766eb3062869086dc66713e1d259ac7c4efc4550.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp
US 8.8.8.8:53 www.vipclassproject2024.space udp

Files

memory/1424-11-0x0000000002220000-0x0000000002224000-memory.dmp

memory/1424-12-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1424-13-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1424-16-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1424-17-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1424-20-0x0000000000400000-0x0000000000482000-memory.dmp

C:\ProgramData\manpi\logs.dat

MD5 e965cdd988d60be7e67a59e97777bd82
SHA1 5fb9dd39dcdd30ad26212ec1a3247cc8e9652063
SHA256 9d88f6d7fe3d189ae0c0d750036d3371d2cb68eb8016408172d893b84c121720
SHA512 39c677f98a95117af2356a5d80abf889b908cd44d8a11571b42d073d86d9c478dc0799e45328796a88273d43acc0f5a61f954b2954302b31f22f3729b9164866