Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
aae85c2cc2984b0ae5d0aaf40469ab10N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aae85c2cc2984b0ae5d0aaf40469ab10N.exe
Resource
win10v2004-20240802-en
General
-
Target
aae85c2cc2984b0ae5d0aaf40469ab10N.exe
-
Size
139KB
-
MD5
aae85c2cc2984b0ae5d0aaf40469ab10
-
SHA1
c5ce46932f96c4da1e0fa772dcf6f7aa22a14a2b
-
SHA256
20e4c5f39e170bbd15b198a648dff4efffa93ee65751965c86b32840aba9135a
-
SHA512
e98a1f235ff2a1bd2cf49984c7c0552b954c8d2e2a0a81b5ee243611f852a6c03d0d3e8ae4059a1432fa7f5d5addcc3b5f6bb7d9648551d38390be7ba3f3f0f5
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjK7:xPd4n/M+WLcilrpgGH/GwY87mVmIXr
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation aae85c2cc2984b0ae5d0aaf40469ab10N.exe -
Executes dropped EXE 2 IoCs
pid Process 3680 wn2ra4ohzdr.exe 2040 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" aae85c2cc2984b0ae5d0aaf40469ab10N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3680 set thread context of 2040 3680 wn2ra4ohzdr.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aae85c2cc2984b0ae5d0aaf40469ab10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3680 3296 aae85c2cc2984b0ae5d0aaf40469ab10N.exe 100 PID 3296 wrote to memory of 3680 3296 aae85c2cc2984b0ae5d0aaf40469ab10N.exe 100 PID 3296 wrote to memory of 3680 3296 aae85c2cc2984b0ae5d0aaf40469ab10N.exe 100 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103 PID 3680 wrote to memory of 2040 3680 wn2ra4ohzdr.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\aae85c2cc2984b0ae5d0aaf40469ab10N.exe"C:\Users\Admin\AppData\Local\Temp\aae85c2cc2984b0ae5d0aaf40469ab10N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3960,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:81⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5ca2b565994aa9a20811472a07c370c6c
SHA1996984f9921b09aa100899434cf0c513425361ba
SHA256c95816a4f7fa2dd082276829105dffc1f77636fce05d980c7f30327b045be0cd
SHA5125e09387ca72fa89b00e9e96c30f748aee309d6aee0e137f6ffbc8729f56398033d881eb63dea4f6b6b60db1430af329071b84bc7256824647005036765d90894