Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe
Resource
win10v2004-20240802-en
General
-
Target
46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe
-
Size
138KB
-
MD5
123b4274053df878e6a9e466e7c0ccaf
-
SHA1
b7098da9010858cb5c75a47916d4c6d294b3cc5d
-
SHA256
46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035
-
SHA512
bbacbf7f9e5a379bac4f235415809951e69321d9048da745ae10b4f54b1523d8014ab6073b783796cabb01a240404a75a049845fe2c4efa530c461805493408a
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjKh:xPd4n/M+WLcilrpgGH/GwY87mVmIXR
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2896 wn2ra4ohzdr.exe 2860 wn2ra4ohzdr.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 2860 2896 wn2ra4ohzdr.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2896 2308 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe 30 PID 2308 wrote to memory of 2896 2308 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe 30 PID 2308 wrote to memory of 2896 2308 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe 30 PID 2308 wrote to memory of 2896 2308 46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe 30 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31 PID 2896 wrote to memory of 2860 2896 wn2ra4ohzdr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe"C:\Users\Admin\AppData\Local\Temp\46126d890c02b8aa69a4776ad7c3fd3f4586c57da53f57cda22efdac37c7e035.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5360fe3ad6c9579e55d48191c442ef8bd
SHA13fdf1bab22945fb5e9602c335a6fd96140867997
SHA25616819487874ac780aa8b00e67c0231becc19a9afbdfd2b4d5396e184307218e7
SHA512c4de2f0de257afed5522b55e5ac134b96dbaa8c1fc8f18301cbf6b006c4cf707413a10e40352fa8983bff1d2a14894455f7096823e6ef2d9495ff2cf2982a9f7