Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe
Resource
win10v2004-20240802-en
General
-
Target
DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe
-
Size
49KB
-
MD5
48f592baee50fd94dee174fc92f017d8
-
SHA1
8bd8ad36ccb17a83d14bdf3d3eeb7db74ab2b5a2
-
SHA256
9bf18fed06c26ef88efd8e78f93dc19918dcd328b25957ccb8ef056cacf1fc3a
-
SHA512
eac79fb91b8ef3d2ed2fe76e3b8df455ce0a845d27f75312ff07292c3996bc5490b42e5e51c99a30d23d8f1e71ae4a9315155e93dc828daa055ac92891c80254
-
SSDEEP
768:85BrpeJ99VwhCnQeTF4Fs5p4+2KW0s20Ui1:89eHRQeTF4A3WBVUw
Malware Config
Extracted
remcos
Send
desconocido07092024.con-ip.com:1510
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
dato
-
mouse_option
false
-
mutex
iuyytdyrcdytvityfytsrtyr-22LTQ2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1476 created 3520 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jjdhshse = "C:\\Users\\Admin\\AppData\\Roaming\\jjdhshse.exe" DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1476 set thread context of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe Token: SeDebugPrivilege 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4836 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101 PID 1476 wrote to memory of 4836 1476 DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD56b619e22a728d75a0c73400f1c9eb500
SHA1bfdd5c70b9169c21ab0c9aacaff1f3ab66900052
SHA25692fe9ab35da5aa141ef4da39561cd654261664302bf982989bad31db2dd63bca
SHA512bf624810445a2aba36110091ecc536af5ead673eb072ca2626c85632b18203a4e15016dd71f1a56b499ef3dea6196b9f4e06e70535f5d77a5dd9edd2214478be