Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
5c482e2f743f26a08c2c635a631f2710N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c482e2f743f26a08c2c635a631f2710N.exe
Resource
win10v2004-20240802-en
General
-
Target
5c482e2f743f26a08c2c635a631f2710N.exe
-
Size
1.4MB
-
MD5
5c482e2f743f26a08c2c635a631f2710
-
SHA1
befba6c4b56b91ed8c4dcda6c2e622f495f1044f
-
SHA256
44c60a89bb1a3de59c88bb8cd3e866ebd245d413c22fcbd0bf5d51bb5650d935
-
SHA512
430e7694444de8ea07c64986a6ce285dd5a71449f7c1230bb08850ed2a853cc180d4fc94011ae71d7bc1278c27bf2fe0b676f65261dd4df2c0ebf8363f387957
-
SSDEEP
24576:ZqDEvCTbMWu7rQYlBQcBiT6rprG8aThFstLk28L2CTpbZmMfKTlZ:ZTvC/MTQYxsWR7aThFstLk28yCdbZmMC
Malware Config
Extracted
remcos
RemoteHost
23.106.127.123:87
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WAC4TL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\undiscernibleness.vbs undiscernibleness.exe -
Executes dropped EXE 1 IoCs
pid Process 4488 undiscernibleness.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00090000000233a9-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4488 set thread context of 4580 4488 undiscernibleness.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c482e2f743f26a08c2c635a631f2710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language undiscernibleness.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4488 undiscernibleness.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5060 5c482e2f743f26a08c2c635a631f2710N.exe 5060 5c482e2f743f26a08c2c635a631f2710N.exe 4488 undiscernibleness.exe 4488 undiscernibleness.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 5060 5c482e2f743f26a08c2c635a631f2710N.exe 5060 5c482e2f743f26a08c2c635a631f2710N.exe 4488 undiscernibleness.exe 4488 undiscernibleness.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4488 5060 5c482e2f743f26a08c2c635a631f2710N.exe 87 PID 5060 wrote to memory of 4488 5060 5c482e2f743f26a08c2c635a631f2710N.exe 87 PID 5060 wrote to memory of 4488 5060 5c482e2f743f26a08c2c635a631f2710N.exe 87 PID 4488 wrote to memory of 4580 4488 undiscernibleness.exe 88 PID 4488 wrote to memory of 4580 4488 undiscernibleness.exe 88 PID 4488 wrote to memory of 4580 4488 undiscernibleness.exe 88 PID 4488 wrote to memory of 4580 4488 undiscernibleness.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\jailkeeper\undiscernibleness.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\5c482e2f743f26a08c2c635a631f2710N.exe"3⤵PID:4580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD598a6ddf7b35db5a0ae1559392c44972e
SHA1eed71d98073847ddd1a0233076cee86cdd3b0899
SHA2563808b0953ae16e27a90085876bfe11645ca7d8d1cafd51315a46d0504a44d918
SHA512b9c14c1651c873d09dd713a6724dc190d85f490a7492505ec502d2982a847159df0f6e71948ef8cd924a91381ac66a9458a881571382ae855151b3a8e93363aa
-
Filesize
29KB
MD50e61f365fccc5d5731f3cef513e3f527
SHA1c48fccf78a6b1456c71265eceed35886d5558f79
SHA256744b5140e3fa446c84eb8b33be90a52a6e4ccea5d859b89e5819ba41367c629f
SHA512f66caa3a6f51799825d6efbf4eb459fac70e928324429d96c527e1742741adb3eeb9d5ebea82ef61140038f60fabb874e2cd0c35f3edb5fe7093975dc4485922
-
Filesize
1.4MB
MD55c482e2f743f26a08c2c635a631f2710
SHA1befba6c4b56b91ed8c4dcda6c2e622f495f1044f
SHA25644c60a89bb1a3de59c88bb8cd3e866ebd245d413c22fcbd0bf5d51bb5650d935
SHA512430e7694444de8ea07c64986a6ce285dd5a71449f7c1230bb08850ed2a853cc180d4fc94011ae71d7bc1278c27bf2fe0b676f65261dd4df2c0ebf8363f387957