Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win10v2004-20240802-en
General
-
Target
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
-
Size
1.4MB
-
MD5
f7d7753ba906c463af989cc1ea66a3a9
-
SHA1
459798998c25c93b2787038a5dcd156ba73bc006
-
SHA256
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
-
SHA512
109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e
-
SSDEEP
24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8auyedioIpgYL9MDIaBg:cTvC/MTQYxsWR7auFibTL7
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-X3UMUO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 name.exe -
Loads dropped DLL 1 IoCs
pid Process 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016d20-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 3068 1248 name.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1248 name.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1248 name.exe 1248 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1248 name.exe 1248 name.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1248 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 28 PID 1368 wrote to memory of 1248 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 28 PID 1368 wrote to memory of 1248 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 28 PID 1368 wrote to memory of 1248 1368 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 28 PID 1248 wrote to memory of 3068 1248 name.exe 29 PID 1248 wrote to memory of 3068 1248 name.exe 29 PID 1248 wrote to memory of 3068 1248 name.exe 29 PID 1248 wrote to memory of 3068 1248 name.exe 29 PID 1248 wrote to memory of 3068 1248 name.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"3⤵PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD583325dd0fedf28c1fb251f2735396905
SHA15a3b848daeb4e04ed42f15173253241450e671f6
SHA2568d5aef55c19fb28949f6b96c845a7f45e983e547c373ccbfffa09aa4531d9005
SHA512aa237171afb725176392786400788be8bf381601251f32cfeecd742fcf9cb195f28afbbde7a25c119865f0dd4c2688e6ca16b90aa1b2b76d4437e1790b59e2e5
-
Filesize
1.4MB
MD5f7d7753ba906c463af989cc1ea66a3a9
SHA1459798998c25c93b2787038a5dcd156ba73bc006
SHA256ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
SHA512109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e