Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
f4aedd9c8b06bf6f30404ae4c5de18c0N.exe
Resource
win7-20240708-en
General
-
Target
f4aedd9c8b06bf6f30404ae4c5de18c0N.exe
-
Size
936KB
-
MD5
f4aedd9c8b06bf6f30404ae4c5de18c0
-
SHA1
9f3b3c5c600416806ca99050f0fe8428e0215720
-
SHA256
94338a235c9207ba31032496ba04d39ae887a3155c15d57347307df2dfa16242
-
SHA512
bb95bb409162e2eb1b4b17f52409c91ed38ac4fb695944fb88607df96279778626af650db6028d96e8bce742480ad9f3971896e08e6417712ee06a256111e39a
-
SSDEEP
24576:Y9MC/qaSu32aV7pOsOwCWiB3F8mUlUAPrs3L0hMa2aa1ucko/8gv:riUu32I+jFvU6APA70hMaz+koX
Malware Config
Extracted
remcos
Aug 20C2
method8888.ddns.net:6902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-81VELC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1720 powershell.exe 2280 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation f4aedd9c8b06bf6f30404ae4c5de18c0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4aedd9c8b06bf6f30404ae4c5de18c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4aedd9c8b06bf6f30404ae4c5de18c0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2280 powershell.exe 2280 powershell.exe 1720 powershell.exe 1720 powershell.exe 2280 powershell.exe 1720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 964 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1720 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 95 PID 1972 wrote to memory of 1720 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 95 PID 1972 wrote to memory of 1720 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 95 PID 1972 wrote to memory of 2280 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 97 PID 1972 wrote to memory of 2280 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 97 PID 1972 wrote to memory of 2280 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 97 PID 1972 wrote to memory of 2856 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 99 PID 1972 wrote to memory of 2856 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 99 PID 1972 wrote to memory of 2856 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 99 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101 PID 1972 wrote to memory of 964 1972 f4aedd9c8b06bf6f30404ae4c5de18c0N.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4aedd9c8b06bf6f30404ae4c5de18c0N.exe"C:\Users\Admin\AppData\Local\Temp\f4aedd9c8b06bf6f30404ae4c5de18c0N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\f4aedd9c8b06bf6f30404ae4c5de18c0N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uULeEHHHWasTQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uULeEHHHWasTQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA4BC.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\f4aedd9c8b06bf6f30404ae4c5de18c0N.exe"C:\Users\Admin\AppData\Local\Temp\f4aedd9c8b06bf6f30404ae4c5de18c0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a58231c14435c991122336f4b5a3424c
SHA182746e97b4fc6eb6b535a2382dd1774d1ad88c8e
SHA2566652a85e863c4caa91c3baf620452af3bf8d8f02cf2a117108657f691dab8686
SHA51282da5ce0bef0c1bbeb7a62b11a3396530142e9adef4bd288be0c5b3e834a0108133cbb4f33ed60b01a0619f99683ebe666a66dbb697a8f27ccdec79a4d92911e
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5c03838e9f5e46eb97441a1ffa5765b9d
SHA12eed911edd1feb249c27078cafbc2d5cae9b6a50
SHA25629e2f3e3f4ebd3715f3fd5e698e36f8493b26a489d59f9a291da3cc5c1860046
SHA5120f7639dba489a4654f157efe0f4e4df66bee484a3c417179f9fcf13404d983ebb3e0d522aba1792f44b82bfa0de2ae49aaddf061d95ad1512eca8673707540a5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD57bdb20ee47dc6fcb9ff3804c9997b12f
SHA1b0113475373c6059da34f51e34e2e5e5b603a167
SHA256552f5185b9f6618f86fcd54a39bf4071d34af5aebac916c4200b520a989cff01
SHA5124a2ba0bab224f5d08cde146c1ae37096af5517a07516eab966ba5e8da3811438f1343d2f5261f109920b78ed491e8cf7b00c6a0aaf7ed8039777a49039b6bbf7