Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
DHLDELIVERYNOTIFICATIONPDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DHLDELIVERYNOTIFICATIONPDF.exe
Resource
win10v2004-20240802-en
General
-
Target
DHLDELIVERYNOTIFICATIONPDF.exe
-
Size
524KB
-
MD5
669d64c3272ef39b87b0df6cf2972992
-
SHA1
36d60c17ff65404b60b32ebe7aa368e1824071a0
-
SHA256
667ac06930c81f8234a56babda66be893bc2b8b865aa1db910fa5b85429ff90d
-
SHA512
61901446c9544eab70f44150d37dfca1106c22335763fc6846b9332bad39ee7700c106e250f866e55055444db72eb0905d0cfb336baee6a6d5da3e7c99d8f6c7
-
SSDEEP
6144:+WMFb/Pv2zstE1gT91qqUfk9TNRs0LT5H7qwpz/LYzlrvLqCNLfSRHa:+BPv2zv1gZ1qDfk9h20LTl+EYJHSRHa
Malware Config
Extracted
remcos
2.6.0 Pro
RemoteHost
79.134.225.12:60256
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
gate
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-IIRGSS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHLDELIVERYNOTIFICATIONPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29 PID 3012 wrote to memory of 2780 3012 DHLDELIVERYNOTIFICATIONPDF.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLDELIVERYNOTIFICATIONPDF.exe"C:\Users\Admin\AppData\Local\Temp\DHLDELIVERYNOTIFICATIONPDF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD54b058d4e2ccd5d37d4791b8621d289a5
SHA104efed207996037ce86ef4e853e1d4a7dde3bb73
SHA256341f5a640b0a778863765ec25ad6c10a7ad15f53e66364b77793c14d8cdf2f0b
SHA512a249000e87529b0bdd7b7997d69b017484b51959a7d9b78e2cbb9884990b4a2bc878fc786c80bb37a2c64e7427a3999e9f3f5c77286c76da08503d00b07fb754