Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
5c482e2f743f26a08c2c635a631f2710N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c482e2f743f26a08c2c635a631f2710N.exe
Resource
win10v2004-20240802-en
General
-
Target
5c482e2f743f26a08c2c635a631f2710N.exe
-
Size
1.4MB
-
MD5
5c482e2f743f26a08c2c635a631f2710
-
SHA1
befba6c4b56b91ed8c4dcda6c2e622f495f1044f
-
SHA256
44c60a89bb1a3de59c88bb8cd3e866ebd245d413c22fcbd0bf5d51bb5650d935
-
SHA512
430e7694444de8ea07c64986a6ce285dd5a71449f7c1230bb08850ed2a853cc180d4fc94011ae71d7bc1278c27bf2fe0b676f65261dd4df2c0ebf8363f387957
-
SSDEEP
24576:ZqDEvCTbMWu7rQYlBQcBiT6rprG8aThFstLk28L2CTpbZmMfKTlZ:ZTvC/MTQYxsWR7aThFstLk28yCdbZmMC
Malware Config
Extracted
remcos
RemoteHost
23.106.127.123:87
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WAC4TL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\undiscernibleness.vbs undiscernibleness.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 undiscernibleness.exe -
Loads dropped DLL 1 IoCs
pid Process 1512 5c482e2f743f26a08c2c635a631f2710N.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000019330-13.dat autoit_exe behavioral1/memory/3060-31-0x0000000000060000-0x00000000001CB000-memory.dmp autoit_exe behavioral1/memory/3060-37-0x0000000000060000-0x00000000001CB000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 3056 3060 undiscernibleness.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c482e2f743f26a08c2c635a631f2710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language undiscernibleness.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3060 undiscernibleness.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1512 5c482e2f743f26a08c2c635a631f2710N.exe 1512 5c482e2f743f26a08c2c635a631f2710N.exe 3060 undiscernibleness.exe 3060 undiscernibleness.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1512 5c482e2f743f26a08c2c635a631f2710N.exe 1512 5c482e2f743f26a08c2c635a631f2710N.exe 3060 undiscernibleness.exe 3060 undiscernibleness.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3060 1512 5c482e2f743f26a08c2c635a631f2710N.exe 30 PID 1512 wrote to memory of 3060 1512 5c482e2f743f26a08c2c635a631f2710N.exe 30 PID 1512 wrote to memory of 3060 1512 5c482e2f743f26a08c2c635a631f2710N.exe 30 PID 1512 wrote to memory of 3060 1512 5c482e2f743f26a08c2c635a631f2710N.exe 30 PID 3060 wrote to memory of 3056 3060 undiscernibleness.exe 31 PID 3060 wrote to memory of 3056 3060 undiscernibleness.exe 31 PID 3060 wrote to memory of 3056 3060 undiscernibleness.exe 31 PID 3060 wrote to memory of 3056 3060 undiscernibleness.exe 31 PID 3060 wrote to memory of 3056 3060 undiscernibleness.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\jailkeeper\undiscernibleness.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD50e61f365fccc5d5731f3cef513e3f527
SHA1c48fccf78a6b1456c71265eceed35886d5558f79
SHA256744b5140e3fa446c84eb8b33be90a52a6e4ccea5d859b89e5819ba41367c629f
SHA512f66caa3a6f51799825d6efbf4eb459fac70e928324429d96c527e1742741adb3eeb9d5ebea82ef61140038f60fabb874e2cd0c35f3edb5fe7093975dc4485922
-
Filesize
1.4MB
MD55c482e2f743f26a08c2c635a631f2710
SHA1befba6c4b56b91ed8c4dcda6c2e622f495f1044f
SHA25644c60a89bb1a3de59c88bb8cd3e866ebd245d413c22fcbd0bf5d51bb5650d935
SHA512430e7694444de8ea07c64986a6ce285dd5a71449f7c1230bb08850ed2a853cc180d4fc94011ae71d7bc1278c27bf2fe0b676f65261dd4df2c0ebf8363f387957