Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Urgent new order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Urgent new order.exe
Resource
win10v2004-20240802-en
General
-
Target
Urgent new order.exe
-
Size
1.7MB
-
MD5
2ba2caed8e7776c9895db0a3e5e0714c
-
SHA1
a3db8f2e22f6674ec60f6fbb11adf1bf65986827
-
SHA256
1df5b2a41831081a752bfd626acb7e216d0c03b0e1b1a7c829a7348a54833c58
-
SHA512
5ca99a0247c154b78a48f0e1b9e663f4ed6f4f1a78f0ff0d93e8d8579d419051ace94d8b91d3889b83f4c227ed387641614365e0ee5e81f23f409654b86677ee
-
SSDEEP
24576:nIx+lXcmg/23DrVykOe1L2gj/EjuJajIA:nrlXc3kVJzBjIuo
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:52121
officerem.duckdns.org:52121
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6GPUH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 3116 2188 Urgent new order.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 3292 2188 Urgent new order.exe 86 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4072 2188 Urgent new order.exe 87 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 4004 2188 Urgent new order.exe 88 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 3116 2188 Urgent new order.exe 89 PID 2188 wrote to memory of 1972 2188 Urgent new order.exe 90 PID 2188 wrote to memory of 1972 2188 Urgent new order.exe 90 PID 2188 wrote to memory of 1972 2188 Urgent new order.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urgent new order.exe"C:\Users\Admin\AppData\Local\Temp\Urgent new order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:3292
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:4072
-
-
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"2⤵PID:1972
-