Analysis
-
max time kernel
147s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win10v2004-20240802-en
General
-
Target
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
-
Size
1.4MB
-
MD5
f7d7753ba906c463af989cc1ea66a3a9
-
SHA1
459798998c25c93b2787038a5dcd156ba73bc006
-
SHA256
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
-
SHA512
109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e
-
SSDEEP
24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8auyedioIpgYL9MDIaBg:cTvC/MTQYxsWR7auFibTL7
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-X3UMUO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 2 IoCs
pid Process 4956 name.exe 1384 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0002000000022a8b-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 3428 1384 name.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4956 name.exe 1384 name.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 4956 name.exe 4956 name.exe 1384 name.exe 1384 name.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 4956 name.exe 4956 name.exe 1384 name.exe 1384 name.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4956 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 4312 wrote to memory of 4956 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 4312 wrote to memory of 4956 4312 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 4956 wrote to memory of 3708 4956 name.exe 88 PID 4956 wrote to memory of 3708 4956 name.exe 88 PID 4956 wrote to memory of 3708 4956 name.exe 88 PID 4956 wrote to memory of 1384 4956 name.exe 89 PID 4956 wrote to memory of 1384 4956 name.exe 89 PID 4956 wrote to memory of 1384 4956 name.exe 89 PID 1384 wrote to memory of 3428 1384 name.exe 93 PID 1384 wrote to memory of 3428 1384 name.exe 93 PID 1384 wrote to memory of 3428 1384 name.exe 93 PID 1384 wrote to memory of 3428 1384 name.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"3⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\directory\name.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3428
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5ab358a75e9c77fdd896157a4f6ae16e3
SHA1afa882bb8b765d13992ddecd8100c54b29994ac8
SHA2560d4f7d0fc02e1b538459965d0b918c905cfa329d797e562f31f3b7b55eb8a307
SHA5123a0e60fc5078ae7c9101a107fa064f49d9b9257d43fbd10aa4b6f771de4c4c5a85ee12e491cea0e68a8b525be29652eb455d9c0d160ca58359709cb9b0545452
-
Filesize
43KB
MD55cb098ed064e69b49da63723ee58c282
SHA1ebb22c82be7013129f4b629ad0feca50d9cb685d
SHA2562616469831f180ea356af62c952fd9f29ff18914dc8a49f383c81f1340267a30
SHA512d3508d986760f97b4e86d9474170b1b3344e75d4d938fe7af22ecf5a22d4e7a159d9862d77c5899d1437b85e79e6698ac38ae835c60e136e82bdecdf01117786
-
Filesize
483KB
MD565e51e1fa61a8c5537085ca5bd8d5e17
SHA1e05e327ea9c1c91e9c8916a737c157342292d5df
SHA256629a3f2d7087d533f5dc6d4301e0c546f20dd79c5618a25e7c22acb0bef78d3a
SHA51248a261640f18c63452425d964ec82a0b2563e742577d84abd11c611336369595cbdff5afcef108a12748ed5d3d7a8c1fbab8140b45e2114b4dbe21b96a005649
-
Filesize
87KB
MD583325dd0fedf28c1fb251f2735396905
SHA15a3b848daeb4e04ed42f15173253241450e671f6
SHA2568d5aef55c19fb28949f6b96c845a7f45e983e547c373ccbfffa09aa4531d9005
SHA512aa237171afb725176392786400788be8bf381601251f32cfeecd742fcf9cb195f28afbbde7a25c119865f0dd4c2688e6ca16b90aa1b2b76d4437e1790b59e2e5
-
Filesize
1.4MB
MD5f7d7753ba906c463af989cc1ea66a3a9
SHA1459798998c25c93b2787038a5dcd156ba73bc006
SHA256ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
SHA512109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e