Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
DHLDELIVERYNOTIFICATIONPDF.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DHLDELIVERYNOTIFICATIONPDF.exe
Resource
win10v2004-20240802-en
General
-
Target
DHLDELIVERYNOTIFICATIONPDF.exe
-
Size
524KB
-
MD5
669d64c3272ef39b87b0df6cf2972992
-
SHA1
36d60c17ff65404b60b32ebe7aa368e1824071a0
-
SHA256
667ac06930c81f8234a56babda66be893bc2b8b865aa1db910fa5b85429ff90d
-
SHA512
61901446c9544eab70f44150d37dfca1106c22335763fc6846b9332bad39ee7700c106e250f866e55055444db72eb0905d0cfb336baee6a6d5da3e7c99d8f6c7
-
SSDEEP
6144:+WMFb/Pv2zstE1gT91qqUfk9TNRs0LT5H7qwpz/LYzlrvLqCNLfSRHa:+BPv2zv1gZ1qDfk9h20LTl+EYJHSRHa
Malware Config
Extracted
remcos
2.6.0 Pro
RemoteHost
79.134.225.12:60256
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
gate
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-IIRGSS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3144 set thread context of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHLDELIVERYNOTIFICATIONPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3144 DHLDELIVERYNOTIFICATIONPDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3144 DHLDELIVERYNOTIFICATIONPDF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1268 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98 PID 3144 wrote to memory of 1268 3144 DHLDELIVERYNOTIFICATIONPDF.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLDELIVERYNOTIFICATIONPDF.exe"C:\Users\Admin\AppData\Local\Temp\DHLDELIVERYNOTIFICATIONPDF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD531b9a6f02aa8f69130bfd4478a824f84
SHA1962284cc13334bb5bbc2f083815e928afb98893e
SHA25603152abd1e3bc64362103100263e8a9bde6bb3242cd69a1dc3e8b492cba36f3c
SHA512e13b21aad22881e7103f60b4399c646e638bdb468d70663f3f9df868f52c3dc6712c08142a28b7c4905c3808320bd6d840d2ede362ad4e5b9b56ac2748c8f23d