Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe
Resource
win7-20240708-en
General
-
Target
8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe
-
Size
1.3MB
-
MD5
7d30af44bb560517782027d6fe376c30
-
SHA1
199e02d5f91ba60c4b60d3a9e48809c2458243f2
-
SHA256
8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92b
-
SHA512
8e2ca25b0066f5bc0b3b613593d96a17a405dc6ca4910c305e3ba007f1033aa3b393eb1b0c25acf8c5a799972b05664a792b107d5cfe86f6ec5bdecf4b71fc21
-
SSDEEP
24576:lAHnh+eWsN3skA4RV1Hom2KXFmIadbBV7SOe50:Uh+ZkldoPK1XadtV+X0
Malware Config
Extracted
remcos
2.4.5 Pro
RIA
2ffahbg8eydhr96hx3x2lje2ymygt5iq.duckdns.org:4431
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remhost
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remkqdjqsdguhsqgdfjqguhjfgcujqsdfgujhqsgdufh,sqhjdgdhjqsgdhjqghgsdhsqjgdj545d4564d64d64dqs4dq645q4s-57XAU6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RAVBg64.url 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
resource yara_rule behavioral2/memory/804-6-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/804-12-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/804-13-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/804-14-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/804-17-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 804 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3056 wrote to memory of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82 PID 3056 wrote to memory of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82 PID 3056 wrote to memory of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82 PID 3056 wrote to memory of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82 PID 3056 wrote to memory of 804 3056 8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe"C:\Users\Admin\AppData\Local\Temp\8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe"C:\Users\Admin\AppData\Local\Temp\8a77c26e754f12fe4dbe1c2e6b9c15d402df83f5474600f0c25430b7b1ccd92bN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD5b4a5abf582a66f85ee92490aa94e648c
SHA1f6dc9c95bb5538ac2256ea4e801178016378ff0d
SHA256a8fb40f51f4bf79e1135a29744548f2769b301c572340e429f1b627583322a18
SHA512ff7c17aaef7d58fc8e27353fe456d9deba5f41053f211231e47134424276ed73cb84a7af2a15ff8f354bad09892e14c82bff9f0f9032d0215cbffbc13721ec28