Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
2023 HSA.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2023 HSA.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
2023 Schedule C.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2023 Schedule C.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
msimg32.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
msimg32.dll
Resource
win10v2004-20240802-en
General
-
Target
2023 Schedule C.exe
-
Size
6.1MB
-
MD5
4864a55cff27f686023456a22371e790
-
SHA1
6ed30c0371fe167d38411bfa6d720fcdcacc4f4c
-
SHA256
08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2
-
SHA512
4bd3a16435cca6ce7a7aa829eb967619a8b7c02598474e634442cffc55935870d54d844a04496bf9c7e8c29c40fae59ac6eb39c8550c091d06a28211491d0bfb
-
SSDEEP
98304:VZQIM+/nv/CDoAkYwpAa5ge1zZ/jtdZwUkQ:bJCKlA2VKUz
Malware Config
Extracted
remcos
RemoteHost
privmerkt.com:6042
nwemarkets.com:5290
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-XE94AK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 2023 Schedule C.exe -
Executes dropped EXE 2 IoCs
pid Process 5092 res_out.exe 3348 res_out.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NostaAshamed = "C:\\Users\\Admin\\Pictures\\NssClipper\\ClipperNss.exe" res_out.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2328 2023 Schedule C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language res_out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language res_out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2023 Schedule C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2023 Schedule C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 3260 2328 2023 Schedule C.exe 94 PID 2328 wrote to memory of 4380 2328 2023 Schedule C.exe 95 PID 2328 wrote to memory of 4380 2328 2023 Schedule C.exe 95 PID 2328 wrote to memory of 4380 2328 2023 Schedule C.exe 95 PID 4380 wrote to memory of 884 4380 cmd.exe 97 PID 4380 wrote to memory of 884 4380 cmd.exe 97 PID 4380 wrote to memory of 884 4380 cmd.exe 97 PID 3260 wrote to memory of 5092 3260 2023 Schedule C.exe 98 PID 3260 wrote to memory of 5092 3260 2023 Schedule C.exe 98 PID 3260 wrote to memory of 5092 3260 2023 Schedule C.exe 98 PID 5092 wrote to memory of 3348 5092 res_out.exe 99 PID 5092 wrote to memory of 3348 5092 res_out.exe 99 PID 5092 wrote to memory of 3348 5092 res_out.exe 99 PID 5092 wrote to memory of 3348 5092 res_out.exe 99 PID 5092 wrote to memory of 3348 5092 res_out.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023 Schedule C.exe"C:\Users\Admin\AppData\Local\Temp\2023 Schedule C.exe"1⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\2023 Schedule C.exe"C:\Users\Admin\AppData\Local\Temp\2023 Schedule C.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\res_out.exe"C:\Users\Admin\AppData\Local\Temp\res_out.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\res_out.exe"C:\Users\Admin\AppData\Local\Temp\res_out.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3348
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD57d1aa3c4ff291fd0b72132e0cffce746
SHA15333ec6264b52bfa2da39653bb41d0499779e1cd
SHA25643fc3b5ab0764c06f9d62ec5f4458c13df381a4334f8019d1906ea76d68e149d
SHA512f02b6ec4f62f1aabd19a5c784f8e906b0340314da36ec3eae6961ffdb7ace591ed0706121ef168d87ed931f60478b01fe5527d63ff615904fed62ea95ceab936