Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
Scan5437.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Scan5437.exe
Resource
win10v2004-20240802-en
General
-
Target
Scan5437.exe
-
Size
968KB
-
MD5
420c470d9c3956325f590dff02110252
-
SHA1
747a5a253a7f0696b213d3e35d9e4bab0a4abadc
-
SHA256
88ed53d7adb9dffeafce182db0b08a075ad0934424949743497b8ea25c9d5671
-
SHA512
ba753c8b52f7655c8d5e10826b30ab77148f99838e3ff26929295dd336a2a80b05b954b49a3682e90f58c1f84748b4de36eb23eaa33e65880cea79146010f259
-
SSDEEP
12288:E2iNbIJAN+8yC+MYx99vo3UxmIVfxCKgSCjSbHfRwMZyhF0toHgt8jvIGc2AI:E1RIJ2DyTGUEIBx4uPgF0toAtsxn
Malware Config
Extracted
remcos
fiver20thAug
rugar.duckdns.org:34046
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DNAOTM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 3028 2384 Scan5437.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan5437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan5437.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3028 Scan5437.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31 PID 2384 wrote to memory of 3028 2384 Scan5437.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD53bcfc096fcb2c3150b3e735e7f181891
SHA187928c31eb9578e2508d2c1dde27751aa48fc204
SHA256c768d02ddf8d8300b3a9fa1e59413ccbcade1e55d09bbb1271d51574ebe52f47
SHA5127f9c17e69de4b42d1b8f71631403ef1a1a91a3f66ef9d3711a35f53f21de24e4fdc662016e38332b08e156fc32525b90fa811b2eb7cbf48fee6ddad8a48a8daf