Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
b54974cd7b04beb5d6c5377ff6170f7b.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b54974cd7b04beb5d6c5377ff6170f7b.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe
Resource
win10v2004-20240802-en
General
-
Target
9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe
-
Size
1.2MB
-
MD5
b54974cd7b04beb5d6c5377ff6170f7b
-
SHA1
229eaffc4f15cbf5b2e21d9360e396aee53fb1b7
-
SHA256
9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff
-
SHA512
ac5d5bc201933745399d16d2e65967129005d1a41aed4b3988ada76ce9926b752322e075353728fcacbcd84dacd9c74ca62a215a3bec3810b10c986e4302cf11
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1Hom2KXMmHa3fGd4WclYQnJ/J+MB8hCdC45:Rh+ZkldoPK8Ya3ed4WcyAJB+M+hM
Malware Config
Extracted
remcos
RemoteHost
45.95.169.137:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-203ZZ1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\icon.vbs icon.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 icon.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/files/0x000c00000002341b-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 1348 2244 icon.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2244 icon.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2244 icon.exe 2244 icon.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 2244 icon.exe 2244 icon.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2244 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 86 PID 2596 wrote to memory of 2244 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 86 PID 2596 wrote to memory of 2244 2596 9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe 86 PID 2244 wrote to memory of 1348 2244 icon.exe 89 PID 2244 wrote to memory of 1348 2244 icon.exe 89 PID 2244 wrote to memory of 1348 2244 icon.exe 89 PID 2244 wrote to memory of 1348 2244 icon.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe"C:\Users\Admin\AppData\Local\Temp\9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\directory\icon.exe"C:\Users\Admin\AppData\Local\Temp\9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff.exe"3⤵PID:1348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5b034f1aaa54283ee47c256574a85ff9a
SHA15de291e89694d741e0af1bd240d1bab7a8988dcf
SHA25610f5c3a669be97b559ab6b46cee58a290cccc74ccaa411723f278080a708ea3a
SHA51283cedbd49ff14e9f4febdd5f06606886f07d79d812e17eb7c936aa5ea89982d99e398122331c0a69f7684495f56777a7e6c3d195b359376700c03c447572964a
-
Filesize
1.2MB
MD5b54974cd7b04beb5d6c5377ff6170f7b
SHA1229eaffc4f15cbf5b2e21d9360e396aee53fb1b7
SHA2569bef149490674703ed211bd591252d0c1557251e2e0844f4d5885d84ec0207ff
SHA512ac5d5bc201933745399d16d2e65967129005d1a41aed4b3988ada76ce9926b752322e075353728fcacbcd84dacd9c74ca62a215a3bec3810b10c986e4302cf11