Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
outsig.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
outsig.exe
Resource
win10v2004-20240802-en
General
-
Target
outsig.exe
-
Size
2.8MB
-
MD5
e26af3f92e8f9e8082d660f31353f86d
-
SHA1
d185030089248234c9e83ad9216b3b8f7890167a
-
SHA256
cb8d0ba3cb1d8f9222e80075cbf88dd0500b557f68d8cda57ce44258a1d2fd52
-
SHA512
9acee413adb0af0414e10153d54b806b5bacc82c878aef60ac6948a41fbdb50533119b547ad4b4f0325c0b3c6e36da3f4f8f3aeb5987810446977377e8c022aa
-
SSDEEP
49152:fA3zZk+dsK03OTOBz54VY/+Xn1wFrk0MlLTBFPFGNK/b337CWpfm6Efmi0:fA3lsF5+3n1ErMlPBFtMibOa5T
Malware Config
Extracted
remcos
NEUVALER
hjgfjygjfghfhfggjjgfyfgjh.con-ip.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-MYQH4O
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\ImageUSB = "C:\\Users\\Admin\\Pictures\\ImageWiz\\ImageUsbTool.exe" outsig.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outsig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outsig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2824 outsig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2824 2272 outsig.exe 31 PID 2272 wrote to memory of 2824 2272 outsig.exe 31 PID 2272 wrote to memory of 2824 2272 outsig.exe 31 PID 2272 wrote to memory of 2824 2272 outsig.exe 31 PID 2272 wrote to memory of 2824 2272 outsig.exe 31 PID 2272 wrote to memory of 2824 2272 outsig.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\outsig.exe"C:\Users\Admin\AppData\Local\Temp\outsig.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\outsig.exe"C:\Users\Admin\AppData\Local\Temp\outsig.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD598ac5b53faff6da62e1fbe604e147b78
SHA1291284775a976315fb758877aea53bac06c935ab
SHA256a8529d7a46058a4ef3bbb9d896c07547307c2891ab75c45f612c42968a457975
SHA512227cbb0e7fba768ec776d88acc2ce0ddc03aac5e5356e0b45ed1a9e22cac9bc585b2c5ab5a94267c46ef2309a6c93278fec27289d3399fd5c7fae69353740b22