Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240708-en
General
-
Target
Quotation.exe
-
Size
1.4MB
-
MD5
1e006059f3779403444376d213c89e77
-
SHA1
c9e293129de50f5f8f7fae3cd75c7d726c8ed18a
-
SHA256
bb6203484b80acc69bffa9a963f3f661d3d02347f3189b7a2ef290ca48608005
-
SHA512
293304ec52f1ad6e7c424c2d8403702ebefcc92929401b7f83795df0597406df084275933b7ab2fa2778a54372e08be6603ca1a474e46b51430542dac2a6526b
-
SSDEEP
24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aSmJAxSoV9m3E2A/:yTvC/MTQYxsWR7aSDSLE2
Malware Config
Extracted
remcos
PTR
profonudcommrce.com:30902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
chrome-LVLUXQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.vbs chrome.exe -
Executes dropped EXE 1 IoCs
pid Process 3340 chrome.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0002000000022d12-14.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3396 Quotation.exe 3396 Quotation.exe 3340 chrome.exe 3340 chrome.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3396 Quotation.exe 3396 Quotation.exe 3340 chrome.exe 3340 chrome.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3340 3396 Quotation.exe 87 PID 3396 wrote to memory of 3340 3396 Quotation.exe 87 PID 3396 wrote to memory of 3340 3396 Quotation.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\directory\chrome.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5bbfcc0b517121ed1642bfec5b7266b77
SHA1f6c74522bcf3be488cbb468436cf812ab80ac09e
SHA25666cc08ff79a04f97ff077e7076049b0227cd9e5a405cd2d5013503201bacc6bc
SHA512f489c91b2b9ee39766142e61cd41c266873e7707c260ad4d5c1480cef6f461f82f7c18155fab3568ec2a398ede4d655880007e0602ecea0b995c832e2fe61123
-
Filesize
84KB
MD573b52971e55ea55fc6fca6ff9f26e6e0
SHA12d4ad4dad7baa519ff032eeeba2969d5a0bcb18d
SHA2563e257b674e8d3eb8686c58d17683ad669c8a040f39b5fd4baf96da9314b0af34
SHA512c210cb16606775297b150ed09beb90285c21d2b05e4a7a86e54525c2589cff9c0ec29f8519c1a1fc8dabeea1ed59af9d76423888d0e0133eb001e706d46f2f9c
-
Filesize
1.4MB
MD51e006059f3779403444376d213c89e77
SHA1c9e293129de50f5f8f7fae3cd75c7d726c8ed18a
SHA256bb6203484b80acc69bffa9a963f3f661d3d02347f3189b7a2ef290ca48608005
SHA512293304ec52f1ad6e7c424c2d8403702ebefcc92929401b7f83795df0597406df084275933b7ab2fa2778a54372e08be6603ca1a474e46b51430542dac2a6526b