Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20240802-en
General
-
Target
Quotation.exe
-
Size
1.0MB
-
MD5
3fcb3ba201b234234bc5d65d20afe8f4
-
SHA1
78917404e82b3bb709ce2caa6a2c291922f1539f
-
SHA256
8c8cad5c12f471f42d5992e71bd32478aedb40af922b03ef4920047012c04d1f
-
SHA512
6d8e182c3386d724aa6e7d6bd266606a31db3b2f553080e03955f04c8c7f80130b67faa6c5f2d7ceb2148f6f638d97dc90296f0ae92354592562c2f1724b714a
-
SSDEEP
24576:L8M3chivYWuMmZIAsS9IfjYf/K2VG4ei4qHAlBTbhkBNQqzcnoT:TQBvIHSfVGoxKhyNpzcnI
Malware Config
Extracted
remcos
RemoteHost
23.95.235.18:2557
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-E0JKXE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2836 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 2740 1640 Quotation.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1640 Quotation.exe 1640 Quotation.exe 1640 Quotation.exe 1640 Quotation.exe 1640 Quotation.exe 1640 Quotation.exe 1640 Quotation.exe 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1640 Quotation.exe Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2836 1640 Quotation.exe 31 PID 1640 wrote to memory of 2836 1640 Quotation.exe 31 PID 1640 wrote to memory of 2836 1640 Quotation.exe 31 PID 1640 wrote to memory of 2836 1640 Quotation.exe 31 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33 PID 1640 wrote to memory of 2740 1640 Quotation.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2740
-