Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
Scan5437.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Scan5437.exe
Resource
win10v2004-20240802-en
General
-
Target
Scan5437.exe
-
Size
968KB
-
MD5
420c470d9c3956325f590dff02110252
-
SHA1
747a5a253a7f0696b213d3e35d9e4bab0a4abadc
-
SHA256
88ed53d7adb9dffeafce182db0b08a075ad0934424949743497b8ea25c9d5671
-
SHA512
ba753c8b52f7655c8d5e10826b30ab77148f99838e3ff26929295dd336a2a80b05b954b49a3682e90f58c1f84748b4de36eb23eaa33e65880cea79146010f259
-
SSDEEP
12288:E2iNbIJAN+8yC+MYx99vo3UxmIVfxCKgSCjSbHfRwMZyhF0toHgt8jvIGc2AI:E1RIJ2DyTGUEIBx4uPgF0toAtsxn
Malware Config
Extracted
remcos
fiver20thAug
rugar.duckdns.org:34046
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DNAOTM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 3140 4796 Scan5437.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan5437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scan5437.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3140 Scan5437.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95 PID 4796 wrote to memory of 3140 4796 Scan5437.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"C:\Users\Admin\AppData\Local\Temp\Scan5437.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD545f97b95d69ac556762abedbfe9a9fa2
SHA14556a97982512e451f5d893ad7de5bdab7dadb74
SHA2563e9ffb2e4c4c6ad63a6e490a16b8ea5074d5123bc99e99436365ad52df24a1d7
SHA512cfe5df3c646eacad4df268421b9eb07401cb4f90b789b08d75d2e4a078cf47e9898aae0e89641b31fc5dbfcb3b42a24eedcc7ab14f34135be317971e14647a4e