Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe
Resource
win10v2004-20240802-en
General
-
Target
b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe
-
Size
1.2MB
-
MD5
68306ab0d9af78095917a7d3a71cb955
-
SHA1
e83aba5a90e4f3033661848ebbc5bfc9776306d0
-
SHA256
b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666
-
SHA512
f084db81e15d8587f2cd97af544de9bab65cd5318e4fff29d636ea291286525f3cd5ef26f197b16ee12e4f8a357db50d2e7588c6fbc8a35aa3d6604897094511
-
SSDEEP
24576:DBkVdlYAQpTFVWzKAqgzVDvwbwLnLNz567iJVG6zgy:lsvIWzigzVDzhJj9gy
Malware Config
Extracted
remcos
RemoteHost12
rem24251mr.duckdns.org:24251
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-P0KZ2Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 22 2200 WScript.exe 25 2200 WScript.exe 28 2200 WScript.exe 30 2200 WScript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1392 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oozoqzoqzp.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oozoqzoqzp.vbs WScript.exe -
Executes dropped EXE 4 IoCs
pid Process 2296 remencryp.exe 5108 remcos_a.exe 3304 remencryp.exe 3200 REMJNBHGBVDFC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 3304 2296 remencryp.exe 92 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remencryp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remencryp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REMJNBHGBVDFC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 powershell.exe 1392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 remencryp.exe Token: SeDebugPrivilege 1392 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5108 remcos_a.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4368 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 86 PID 2820 wrote to memory of 4368 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 86 PID 2820 wrote to memory of 4368 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 86 PID 2820 wrote to memory of 2200 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 87 PID 2820 wrote to memory of 2200 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 87 PID 2820 wrote to memory of 2200 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 87 PID 2820 wrote to memory of 2296 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 88 PID 2820 wrote to memory of 2296 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 88 PID 2820 wrote to memory of 2296 2820 b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe 88 PID 4368 wrote to memory of 5108 4368 WScript.exe 90 PID 4368 wrote to memory of 5108 4368 WScript.exe 90 PID 4368 wrote to memory of 5108 4368 WScript.exe 90 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2296 wrote to memory of 3304 2296 remencryp.exe 92 PID 2200 wrote to memory of 1392 2200 WScript.exe 98 PID 2200 wrote to memory of 1392 2200 WScript.exe 98 PID 2200 wrote to memory of 1392 2200 WScript.exe 98 PID 1392 wrote to memory of 3200 1392 powershell.exe 101 PID 1392 wrote to memory of 3200 1392 powershell.exe 101 PID 1392 wrote to memory of 3200 1392 powershell.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe"C:\Users\Admin\AppData\Local\Temp\b242dea1f8658786e7989e8a2ecb65e652167b3077fd9ecd20642e9917adc666.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MyProcess\ascdfv.js"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5108
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MyProcess\REM.vbs"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -WindowStyle Hidden -command Start-Process 'C:\Users\Admin\AppData\Roaming\REMJNBHGBVDFC.exe' exit3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\REMJNBHGBVDFC.exe"C:\Users\Admin\AppData\Roaming\REMJNBHGBVDFC.exe" exit4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
-
C:\MyProcess\remencryp.exe"C:\MyProcess\remencryp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\MyProcess\remencryp.exe"C:\MyProcess\remencryp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ffab60b54877eba5219e9ace88003e06
SHA16401355bf2ceaf825aea9f56e78a7f5be0c6b37a
SHA256794fea30a1ba942d3fad6982f81983623cb36ceb4cbfc4f6666e83db32ecee1a
SHA51205201d116a0e273870db463f0bfb650a36b9a7cac96ad39a013c7f505b8daf2365c0cbe3af707fef4beeff5d3450293266539055b7a8cd9b6b6b794202fc06a2
-
Filesize
644KB
MD587609dfc36ac35f80b4da54f9535a88d
SHA1ea758f9300ed0ec915c287780ffed084c7ea5943
SHA256e866e382495c91465128b284807c321d188a1ca79dd69f48b626901a3bd75b1e
SHA5121fe8fa6b3162ffeb5b1b3623d38dc2b432012ff4b187197e820a66dd88338003382711feb04295dea835109bed3d981bc641edb20bafdc3786f41bfce118c7ba
-
Filesize
604KB
MD5fbcf58f9ce64d200379298fcd87aa56b
SHA174388b7d29b042a1dabfeda00066eda76a9cf348
SHA256303e415db0644366a316524070b046b1b2a5dd2441258d6295859abc74f352ff
SHA5123873f23e8a350b812f7edb6770cc625604a877d658453ddd4f4a84b975d88dbbfb19c071a1f089eeb21fb524edd8bdd395aa5e8b484b87ce29480e9ca39e32df
-
Filesize
144B
MD5416b4c4215e9ad7ef31d85cebaf78482
SHA1f0aba96394da46efff7355c9b0c448e7e86a5de4
SHA2568ef6beb1bd8601de9461cf6bfe3b93d7629cde1dc81d9241f9ae05837b8bdce6
SHA512a3d2476f79fdc82a16e710fffe25f65fb8d04b97acb50b30252cbf53bd617c48f4e0f4b601387ebe191eacf03073eb391a7bea6a717645b46877156ff381d645
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
483KB
MD5b0a4175cd9541a154e82efe59daa2b05
SHA1e9ccf2c17da8b0fc2690a5cad0f8067de577b49d
SHA256d6f030194295bdec3c4ec91fbaf7dacd7a9b83edb99c4fd6556eb4eb7d948840
SHA5125f805e6c9be95936d1a78ac58a988dc700f7ae81429edcc46d63f39a056ab756e4ff0f11dcbe74e8ee21c62510b724a9ede9e9b5306bf8948046ee3f0575abdb