Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d3dx9_43.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3dx9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
scr_previw.exe
Resource
win7-20240903-en
General
-
Target
scr_previw.exe
-
Size
2.2MB
-
MD5
d9530ecee42acccfd3871672a511bc9e
-
SHA1
89b4d2406f1294bd699ef231a4def5f495f12778
-
SHA256
81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
-
SHA512
d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
SSDEEP
49152:rHOut2Bf0ajIM8XEEN6N0rE/I/vqn7krQEQusd5F:VbaMbXbE/I/SnwrQEQusd/
Malware Config
Extracted
remcos
stalagg
5.181.156.117:8576
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-5TL39W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 scr_previw.exe -
Loads dropped DLL 3 IoCs
pid Process 2432 scr_previw.exe 2752 scr_previw.exe 2564 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2564 2752 scr_previw.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2432 scr_previw.exe 2752 scr_previw.exe 2752 scr_previw.exe 2564 cmd.exe 2564 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2752 scr_previw.exe 2564 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2752 2432 scr_previw.exe 31 PID 2432 wrote to memory of 2752 2432 scr_previw.exe 31 PID 2432 wrote to memory of 2752 2432 scr_previw.exe 31 PID 2432 wrote to memory of 2752 2432 scr_previw.exe 31 PID 2752 wrote to memory of 2564 2752 scr_previw.exe 32 PID 2752 wrote to memory of 2564 2752 scr_previw.exe 32 PID 2752 wrote to memory of 2564 2752 scr_previw.exe 32 PID 2752 wrote to memory of 2564 2752 scr_previw.exe 32 PID 2752 wrote to memory of 2564 2752 scr_previw.exe 32 PID 2564 wrote to memory of 1800 2564 cmd.exe 34 PID 2564 wrote to memory of 1800 2564 cmd.exe 34 PID 2564 wrote to memory of 1800 2564 cmd.exe 34 PID 2564 wrote to memory of 1800 2564 cmd.exe 34 PID 2564 wrote to memory of 1800 2564 cmd.exe 34 PID 2564 wrote to memory of 1800 2564 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\scr_previw.exe"C:\Users\Admin\AppData\Local\Temp\scr_previw.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exeC:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5273ce3c65b67f3809e8668f83a7e10c9
SHA1e6fc0c02d7a09eb5fd0bddadd7130e3e29cf7cb2
SHA256a22f25657fc4d0bd2fc1bf8b377210d14ae6d8f32000407ca5eb20f84446d865
SHA51259046f21f51f6952a465691d915e6ac1e7c4299869570db91df6e15f3f9317b830abd353f95a578bb4015225f2dd154304885ee55146efc40f8db55060cc6559
-
Filesize
1.9MB
MD546e435aecb557fcb16ae2ea3b22ab7fd
SHA15290156599fd9575c4401c80949ad5672fe64da5
SHA25670e0b720bb461503acbd947a8355fb629d703b8d7f99ddfbb09a0c71886861da
SHA512621010aa44868062361c6dbb670f8664c370ddcb0afbb5835765470522c03bb5ac779e86236cfffdcf343cbc582f81beacd2a7108d78c90d4dfc4c38e7d23bb3
-
Filesize
1.0MB
MD5289d2d639e058b63ebe16bd8d543115d
SHA1969736e5f6a2c416f556e2f73358020573486afc
SHA256f21bf56c8d15824dc1cf4108725f73154b88a89ab23f00a7f8dbb2d2de8e2568
SHA5127adf83c9795d9705c4c1345422d17ad26b6d4f27a8242674f44b2d2a05080e532d9a64c43803164bf25c4e9eb5cac7a0d3789d71e9f34b46b5b9c6203fad65aa
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
Filesize
80KB
MD5cae9827c507632c4a1980479c21a42a2
SHA1d9a1c5900a93066645bf8fb7c79dacf56f3eaa3e
SHA256efeec4c2f612130ec81f3796bba26471e14dcf97b0e22247b7c7f40ad2eba0cf
SHA512441fb631ed26bfe5b84c4fd267a43fbacc64e0adae0e90d0d8e11a248fa2ab47d43a54f1cc3903532943d158d87a2e236976830834545b0d13471731b6f61768