Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
QUOTATION.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
k08cwjcrlzilk8t.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
k08cwjcrlzilk8t.dll
Resource
win10v2004-20240802-en
General
-
Target
QUOTATION.exe
-
Size
181KB
-
MD5
40361eb24f8fb52b2a653a55afec7952
-
SHA1
d8bc9d3adac423aee35fc65a224c820eae9ec063
-
SHA256
a134e9815c6d82b5dd7589b78c3d3ac93f7fbc9ee24072748bd53cdf63164d1c
-
SHA512
b79fab70b89781b951bbdc5048aca34001d403a3cde4800c7ef94fdb3d3370439920606142579e51800bad681443c16970049535fd24a81897d723a83992e8d8
-
SSDEEP
3072:4BkfJpRXATwMdFCcob0Z5EcwGXBPWsJzSSFteC7rJpQyjdRjAz+eFXerwxHHYMKy:4qjIQCE3GXBPWLSFteC7rT93jDAXeqH9
Malware Config
Extracted
remcos
2.7.2 Pro
RemoteHost
nikkihutsltd.duckdns.org:19139
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
chrome
-
copy_folder
chrome
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
chrome
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
chrome-T2ENBJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
chrome
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2780 QUOTATION.exe 2780 QUOTATION.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\name = "C:\\Users\\Admin\\AppData\\Roaming\\folder\\file.exe" QUOTATION.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 2828 2780 QUOTATION.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2780 QUOTATION.exe 2780 QUOTATION.exe 2780 QUOTATION.exe 2780 QUOTATION.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2780 QUOTATION.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2828 QUOTATION.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2828 2780 QUOTATION.exe 30 PID 2780 wrote to memory of 2828 2780 QUOTATION.exe 30 PID 2780 wrote to memory of 2828 2780 QUOTATION.exe 30 PID 2780 wrote to memory of 2828 2780 QUOTATION.exe 30 PID 2780 wrote to memory of 2828 2780 QUOTATION.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD505ad6c2690084ff9cc4ff14b455b781e
SHA19b0ff8da652e83aa675bfc5fd7d5c9173d134509
SHA25697de472526c14080264663f4b729df51c4208a1e37d190a0412076a682f0aa7b
SHA512e48f4b3ac853d6669f5e9f2dd7516eb268941f50189e6f99a7d5f4ef9bab88709bc6c9c02267e6f61659dba50c67163481376c3cb6d4e5bc7a6641f15b9e309e
-
Filesize
74B
MD54ea42f525ae7616245ada74e0edfef06
SHA10eb1cc6e54c7f474185f97e0287dd93faa0b7bff
SHA25603d983a93e92303643e74d8e40aa9cee8f059d95c9a8d1de9660dc1b9b271cd0
SHA512722fc5135d6931fcdc7d58acffe4728af611e79358928b919e502614d9f8e4f74c0ac60ea36b5d7fd80e00d90203536a0f7bcd0bd1593accdf94ed6f3e8a76e8
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c