Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
quotation.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
quotation.exe
Resource
win10v2004-20240802-en
General
-
Target
quotation.exe
-
Size
1.3MB
-
MD5
347e851f26cedb5a5ab9eebb2064a32b
-
SHA1
ed45d95c46b594eaa6c752b492bdadabe65e35f0
-
SHA256
3ee5a0f95d5d8da1deb9757d957b519367b4850f1716a6bf1fb1129e385a007f
-
SHA512
fc41e6ea9c2f1002d89f82faeb3901b130087aa8528004f1b2545c8ba620309cb84a63b20fbf08ee133e6a3386f2d8dc24b65b576f29be887a6309efcef63f8d
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8amDw9qlGZg3LMf3gPCTGE7F2F/xke:mTvC/MTQYxsWR7amDv8FtKk
Malware Config
Extracted
remcos
RemoteHost
23.95.235.18:2557
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-E0JKXE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.vbs chrome.exe -
Executes dropped EXE 2 IoCs
pid Process 872 chrome.exe 4672 chrome.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023437-14.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3120 quotation.exe 3120 quotation.exe 872 chrome.exe 872 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3120 quotation.exe 3120 quotation.exe 872 chrome.exe 872 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3120 wrote to memory of 872 3120 quotation.exe 87 PID 3120 wrote to memory of 872 3120 quotation.exe 87 PID 3120 wrote to memory of 872 3120 quotation.exe 87 PID 872 wrote to memory of 4672 872 chrome.exe 88 PID 872 wrote to memory of 4672 872 chrome.exe 88 PID 872 wrote to memory of 4672 872 chrome.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\quotation.exe"C:\Users\Admin\AppData\Local\Temp\quotation.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\directory\chrome.exe"C:\Users\Admin\AppData\Local\Temp\quotation.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\directory\chrome.exe"C:\Users\Admin\AppData\Local\directory\chrome.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5d2d44686e0bc5bd11aa72ff1a2bad604
SHA16dcf2641b47d274c0103b649915cf1a322b8f35c
SHA256f28a8e2f1415306e9785e8d2893c66748f2756665382e84bdc7001e39fdc34f5
SHA512683e3e556d4ee646126d4412425236fccafb309219d7a21a8e9bdf3924152519074b037e0a01f26cb8477a2312b61bea12f67bfc3975a7a8d6431d4b9cfa9a2a
-
Filesize
42KB
MD5fd1dd846c22094358d1bd3e1d9a78e59
SHA19c3311b8c9d0312a6100bb6c366ae3b3ee5a6a23
SHA256ac0bc26c85e2a4f7c65fdeb91690dd22a3454ce9ce7da165eb0b8d860c733b0a
SHA5126fc71b2e992a35bbb69cfec413ef5e3693bb1420e02a8b16187fc083f753347d516813ce666c36985c1ca083f26a2462bb102bed2daf51094f1ce593156ceb81
-
Filesize
483KB
MD537b9493a4bbd84adfdec40b1be5a1613
SHA1543bd8b58ed60ee9bc9f6b41eeec28063703c2c8
SHA2569c2a3ba8cf516812d6aebd5f2c723b3863613dce841a805cdf40423e9ea3e26d
SHA51281aebaea8a1b0ea51491a2b4d8111820a0aa3281783383d646f0f924eb7d79b007f97a5145cfde172beca044141a4fe15fbab7a8d9456e62625ec656fb1bbbb9
-
Filesize
84KB
MD5bbed02ae545f466bc86629f4026b46e7
SHA13f184cf1eb77083b850fd4281662dcd3f8fbf74b
SHA256fec372f0a7083817332ab1545a1bcb850cebcd3c3f018c25b0ec69347fbb2c4a
SHA51233175064effcf7c0c7623f38a0a7d4ee63e7f2c506eb2beac3a7e0485fa20bbee1d9903aaf677220dc6f7f3a9ad3b4949082abf1a0f078d01904a9e96b28d27e
-
Filesize
1.3MB
MD5347e851f26cedb5a5ab9eebb2064a32b
SHA1ed45d95c46b594eaa6c752b492bdadabe65e35f0
SHA2563ee5a0f95d5d8da1deb9757d957b519367b4850f1716a6bf1fb1129e385a007f
SHA512fc41e6ea9c2f1002d89f82faeb3901b130087aa8528004f1b2545c8ba620309cb84a63b20fbf08ee133e6a3386f2d8dc24b65b576f29be887a6309efcef63f8d