Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
Resource
win10v2004-20240802-en
General
-
Target
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe
-
Size
1.4MB
-
MD5
f7d7753ba906c463af989cc1ea66a3a9
-
SHA1
459798998c25c93b2787038a5dcd156ba73bc006
-
SHA256
ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
-
SHA512
109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e
-
SSDEEP
24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8auyedioIpgYL9MDIaBg:cTvC/MTQYxsWR7auFibTL7
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-X3UMUO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 name.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000900000001e557-14.dat autoit_exe behavioral2/memory/1736-29-0x0000000000ED0000-0x0000000001031000-memory.dmp autoit_exe behavioral2/memory/1736-34-0x0000000000ED0000-0x0000000001031000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1736 set thread context of 4384 1736 name.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1736 name.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1736 name.exe 1736 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 1736 name.exe 1736 name.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1736 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 1884 wrote to memory of 1736 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 1884 wrote to memory of 1736 1884 ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe 87 PID 1736 wrote to memory of 4384 1736 name.exe 88 PID 1736 wrote to memory of 4384 1736 name.exe 88 PID 1736 wrote to memory of 4384 1736 name.exe 88 PID 1736 wrote to memory of 4384 1736 name.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD565e51e1fa61a8c5537085ca5bd8d5e17
SHA1e05e327ea9c1c91e9c8916a737c157342292d5df
SHA256629a3f2d7087d533f5dc6d4301e0c546f20dd79c5618a25e7c22acb0bef78d3a
SHA51248a261640f18c63452425d964ec82a0b2563e742577d84abd11c611336369595cbdff5afcef108a12748ed5d3d7a8c1fbab8140b45e2114b4dbe21b96a005649
-
Filesize
87KB
MD583325dd0fedf28c1fb251f2735396905
SHA15a3b848daeb4e04ed42f15173253241450e671f6
SHA2568d5aef55c19fb28949f6b96c845a7f45e983e547c373ccbfffa09aa4531d9005
SHA512aa237171afb725176392786400788be8bf381601251f32cfeecd742fcf9cb195f28afbbde7a25c119865f0dd4c2688e6ca16b90aa1b2b76d4437e1790b59e2e5
-
Filesize
1.4MB
MD5f7d7753ba906c463af989cc1ea66a3a9
SHA1459798998c25c93b2787038a5dcd156ba73bc006
SHA256ee36f3561339143b4225add8eaf3520a29034e6d910b9b67529128051d0c39b2
SHA512109c5a877a47013121bebe86c3451e8bdaa7d8bc42bead5de28f75dbc5bae953c5a60008bd16d73bb65b63f7284bf72111769d2160bde5715c0a7b4a9f3a0d7e