Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
csrss.exe
Resource
win10v2004-20240802-en
General
-
Target
csrss.exe
-
Size
1.2MB
-
MD5
354b34a3694e2b4d54ba3bca624aa3c3
-
SHA1
660ee183f7f7a17eace0556c8883a2c361424cb0
-
SHA256
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384
-
SHA512
f78bbbd45ee9dc147394f79c0aed2c8104c42116b72c653586ac0855d0c075e3b17571bc62e33ba055bcc91197f6e2a491e97ad35eab8f425bbf713a5e0b5870
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aLHWD2rmiOWlcIqDBZLAkxy06A:rVg5tQ7aLHWDd/B9A65
Malware Config
Extracted
remcos
RemoteHost
spacesave.duckdns.org:14645
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-RLABK3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dddddd.vbs dddddd.exe -
Executes dropped EXE 2 IoCs
pid Process 4828 dddddd.exe 888 dddddd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0002000000022a8b-14.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4876 csrss.exe 4876 csrss.exe 4828 dddddd.exe 4828 dddddd.exe 888 dddddd.exe 888 dddddd.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 4876 csrss.exe 4876 csrss.exe 4828 dddddd.exe 4828 dddddd.exe 888 dddddd.exe 888 dddddd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4828 4876 csrss.exe 87 PID 4876 wrote to memory of 4828 4876 csrss.exe 87 PID 4876 wrote to memory of 4828 4876 csrss.exe 87 PID 4828 wrote to memory of 888 4828 dddddd.exe 88 PID 4828 wrote to memory of 888 4828 dddddd.exe 88 PID 4828 wrote to memory of 888 4828 dddddd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD54a528c9e55817786057cd2ab4271dac0
SHA12c0b82cb50af76330de89b69164b9a32f59ea5d8
SHA25602ef6f365d2d9e4ab97c80fe70d89f7b51cc5914a6756b17e1d372b40af25b44
SHA5125e672a53bb82b881d3ad1c492a93096589e8a9c2ed920be5d1e5ef93453baded47db96be55b74a84547edcf33d95b0ae1b1c2aed5d2d103e26481960545c517c
-
Filesize
10KB
MD5794dd42e43c9f5f2a14a526c2c78e768
SHA14e31258ac80b9ecbdd8e9001c07378f2868b8350
SHA2568927cfafaefe0cc666afbeefcb0c4558e67df5e184f30f6a6420bcfdafd6229d
SHA512642254b6c1b3d414a239a431cff2910f8707d638aca5d7af03ad5fe655766b18cbf1e8f94f0593b9ffe3de17a4205e5762a2b244a336f91d30e4c0e6ea3d5c05
-
Filesize
56KB
MD5be57919a8e6f5c3d638c08144dfff614
SHA1a096881aaea02eecc45536e041050cf08917b433
SHA25688b06124dd503e93614f8dc3fd011565c949e2a36ecb44c0a9de685465330167
SHA5128c6154154f3ee2ed6d19b6527f89ae3279fc64b0489baf415b1779cbe2af12d4f4cac2fd67e2c57a825639f86e8b4a72ca2ead831fe93bc90141a013bb4bbcf5
-
Filesize
64KB
MD5747e94021b02202d57f46e4edfbd3455
SHA198e854546b0344e046448024966d4535fc3d5108
SHA2568e1f959a3bc17073e652a047f71e1b47bb75383dcaa7d7bb2dab2b0be1079422
SHA512c51b7ef5c69984221b302accfce5f5927485fe9d68397d0aea7e7afc04ed9d9c1abb9611150390f42ba618d04ae38179da80a681e2041a64b03053a7828cedd3
-
Filesize
483KB
MD5f4461a02e25109973cdf62c9260edc73
SHA1988eaf6cf392bc92f09c514a99db3b44bd9d0450
SHA25635317bf8ab08c12751490059e9af81b8226b013401e9906ad109e49c1924d13f
SHA512f6d86a3f8702d89acc1c4cb63fbd81d03a8f86d8f43ce1a244343b59b6121416420c421e10830675dd970d97064ab2b7b422b60fe2658b263daf12f2932707dc
-
Filesize
1.2MB
MD5354b34a3694e2b4d54ba3bca624aa3c3
SHA1660ee183f7f7a17eace0556c8883a2c361424cb0
SHA25652e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384
SHA512f78bbbd45ee9dc147394f79c0aed2c8104c42116b72c653586ac0855d0c075e3b17571bc62e33ba055bcc91197f6e2a491e97ad35eab8f425bbf713a5e0b5870