Overview
overview
3Static
static
1abcdefgRemus.zip
windows7-x64
1abcdefgRemus.zip
windows10-2004-x64
1blob/{3a30...}.blob
windows7-x64
3blob/{3a30...}.blob
windows10-2004-x64
3blob/{5b9c...}.blob
windows7-x64
3blob/{5b9c...}.blob
windows10-2004-x64
3images/{1d...f}.png
windows7-x64
3images/{1d...f}.png
windows10-2004-x64
3images/{21...d}.png
windows7-x64
3images/{21...d}.png
windows10-2004-x64
3images/{3b...c}.png
windows7-x64
3images/{3b...c}.png
windows10-2004-x64
3images/{91...0}.png
windows7-x64
3images/{91...0}.png
windows10-2004-x64
3images/{cd...6}.png
windows7-x64
3images/{cd...6}.png
windows10-2004-x64
3images/{ce...1}.png
windows7-x64
3images/{ce...1}.png
windows10-2004-x64
3project.xml
windows7-x64
3project.xml
windows10-2004-x64
1versions.xml
windows7-x64
3versions.xml
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
abcdefgRemus.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
abcdefgRemus.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
blob/{3a30aef8-e1c0-4d9e-8b3e-d8b6989361c4}.blob
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
blob/{3a30aef8-e1c0-4d9e-8b3e-d8b6989361c4}.blob
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
blob/{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
blob/{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
images/{1d57a91b-e586-4e80-95ff-67e97222ab4f}.png
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
images/{1d57a91b-e586-4e80-95ff-67e97222ab4f}.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
images/{2148ee6a-c99a-4faf-a4e5-bf20b150bfad}.png
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
images/{2148ee6a-c99a-4faf-a4e5-bf20b150bfad}.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
images/{3be06f51-474c-4007-85ed-649ac0e946cc}.png
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
images/{3be06f51-474c-4007-85ed-649ac0e946cc}.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
images/{91a6b565-48aa-4aec-a415-5cecb2f30280}.png
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
images/{91a6b565-48aa-4aec-a415-5cecb2f30280}.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
images/{cd42ee70-0fa0-4931-8c6d-cd656b372326}.png
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
images/{cd42ee70-0fa0-4931-8c6d-cd656b372326}.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
images/{ced8c77c-03ab-4e18-8085-bb4a5361cec1}.png
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
images/{ced8c77c-03ab-4e18-8085-bb4a5361cec1}.png
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
project.xml
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
project.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
versions.xml
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
versions.xml
Resource
win10v2004-20240802-en
General
-
Target
blob/{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob
-
Size
191KB
-
MD5
22bbef13012e0bf0a4debc65eccf3bab
-
SHA1
d78134e246a424b16e8f3f5a31942d1f97fae51b
-
SHA256
08207d55d59c69fb86635018f6a46af03fa2cbab56a031eda0d8ddb418cc4026
-
SHA512
3359ca10119af5527cd133ad9bfdd11eee36df9dd81bb61b5a4359cf713b601a3388b0f015cd2f70e4637d0931e6d4fefbdf74b6762cd015ea31beb8694c6d20
-
SSDEEP
3072:Rz5W1hZBET7TebmUyLkbTgH9zJXv1i6zNIghReuuBmCY+bFQHzBh23:P7XeQ60z1tLIeRymCtFIzO3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.blob rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\.blob\ = "blob_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\blob_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2684 2084 cmd.exe 31 PID 2084 wrote to memory of 2684 2084 cmd.exe 31 PID 2084 wrote to memory of 2684 2084 cmd.exe 31 PID 2684 wrote to memory of 2804 2684 rundll32.exe 33 PID 2684 wrote to memory of 2804 2684 rundll32.exe 33 PID 2684 wrote to memory of 2804 2684 rundll32.exe 33 PID 2684 wrote to memory of 2804 2684 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\blob\{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\blob\{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\blob\{5b9c4641-a20a-4d79-aa7f-771e65a63e3d}.blob"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56c42148edf2e38227834ab0fece715ae
SHA119a7dc4221e747873a4c526a14d164b54770ef81
SHA256e659c1564fbb60d1d125885105413b79199fffcaa2079a927ef0037b35adb71b
SHA512ab5388a2fd22a85340f3b33ed702bb4a7e98f7ddfd2cb89001d2b80680f50d3156dd843ae48c4d321daa2b0f9909eb64a93eedf834c685befe000f6fe7fb2cf7