Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe
Resource
win10v2004-20240802-en
General
-
Target
ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe
-
Size
139KB
-
MD5
59fe5df73a4e6530b74b9c6905057b68
-
SHA1
1a70fd94ac0f65e9c0a022931cdba47fd49e8060
-
SHA256
ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065
-
SHA512
c39bcb9359345bffc8df3f400cd4965ee90f67d6fbe1bd4dcc4f17685c21d3758a19e46ab9527a5003f83e2bd7dcd2826eb08d98c21cafb0176c73b7b9f70534
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjKt:xPd4n/M+WLcilrpgGH/GwY87mVmIXd
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe -
Executes dropped EXE 2 IoCs
pid Process 4012 wn2ra4ohzdr.exe 820 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4012 set thread context of 820 4012 wn2ra4ohzdr.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 820 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2200 wrote to memory of 4012 2200 ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe 100 PID 2200 wrote to memory of 4012 2200 ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe 100 PID 2200 wrote to memory of 4012 2200 ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe 100 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104 PID 4012 wrote to memory of 820 4012 wn2ra4ohzdr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe"C:\Users\Admin\AppData\Local\Temp\ed5391fd4d979f93106992c27ae240ddd1cdff407c11bcbb5def272901978065.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4180,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:81⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5e9bba68b08135ded3de8326f8b0a8b39
SHA12d5394bf275553a24179ec2045127377b1a3d449
SHA256ede24dab5913e45f3c40e8eaef3711409ee58d03569f0bdc6cdc6645de4e0a58
SHA512b5b6012ec98ec8a07974842ac835ec00a94f4cd5da88541e7e069de02e05587bb1309c820dbbec184d20d8671a91837549b5ff96826f526c4d6b8ec271fd6e25