Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 16:09
Behavioral task
behavioral1
Sample
FG098700000000.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FG098700000000.exe
Resource
win10v2004-20240802-en
General
-
Target
FG098700000000.exe
-
Size
768KB
-
MD5
989054c5af86019ccfa32642ae628639
-
SHA1
5fe55707a4eebd51723ea950aa80d3a49e810207
-
SHA256
1f75782173ef3b1b68650a95b7846bb35faa400d53b52fc1ad8b65a86bc72c88
-
SHA512
401e5f2508ddc81d24047cbf707f35c121fcc07c9e2be6f477175ee275e970a52e0aedb905ce0ca026645477d4b89dfb989dc9361302c037d632d67fe3e128d9
-
SSDEEP
12288:oYV6MorX7qzuC3QHO9FQVHPF51jgcHJqOhTbYQ270cUq+rMxw0GakFQjIE8xQPPK:HBXu9HGaVHH75bYjVM1T4M3aCjpn7
Malware Config
Extracted
remcos
RemoteHost
107.175.229.139:8823
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-2BGC0K
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\stickers.vbs stickers.exe -
Executes dropped EXE 1 IoCs
pid Process 1392 stickers.exe -
resource yara_rule behavioral2/memory/4900-0-0x00000000005E0000-0x000000000078D000-memory.dmp upx behavioral2/files/0x00070000000233c2-14.dat upx behavioral2/memory/1392-15-0x0000000000EB0000-0x000000000105D000-memory.dmp upx behavioral2/memory/4900-16-0x00000000005E0000-0x000000000078D000-memory.dmp upx behavioral2/memory/1392-39-0x0000000000EB0000-0x000000000105D000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4900-16-0x00000000005E0000-0x000000000078D000-memory.dmp autoit_exe behavioral2/memory/1392-39-0x0000000000EB0000-0x000000000105D000-memory.dmp autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FG098700000000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stickers.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4900 FG098700000000.exe 4900 FG098700000000.exe 1392 stickers.exe 1392 stickers.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4900 FG098700000000.exe 4900 FG098700000000.exe 1392 stickers.exe 1392 stickers.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1392 4900 FG098700000000.exe 87 PID 4900 wrote to memory of 1392 4900 FG098700000000.exe 87 PID 4900 wrote to memory of 1392 4900 FG098700000000.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\FG098700000000.exe"C:\Users\Admin\AppData\Local\Temp\FG098700000000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\cacostomia\stickers.exe"C:\Users\Admin\AppData\Local\Temp\FG098700000000.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD553d1620db5ae2d117b8af69b2b19f93a
SHA10d431c1267215e3b4c086aa8f1c78991d4c984cb
SHA256e8e430ca61bf1b86ef12b9a87f39cad3058398e6adebc71f7ca82f79de2dd590
SHA512a97c87f719b6b67333b5a1ae7430cafa9d8ae6255af3f11a6281dccfad8c4e0e5adb6967158bcc653809822480f142278fecbff8a15fc4cad73f945512851df9
-
Filesize
768KB
MD5989054c5af86019ccfa32642ae628639
SHA15fe55707a4eebd51723ea950aa80d3a49e810207
SHA2561f75782173ef3b1b68650a95b7846bb35faa400d53b52fc1ad8b65a86bc72c88
SHA512401e5f2508ddc81d24047cbf707f35c121fcc07c9e2be6f477175ee275e970a52e0aedb905ce0ca026645477d4b89dfb989dc9361302c037d632d67fe3e128d9