Overview
overview
10Static
static
3IIMG124595...11.exe
windows7-x64
10IIMG124595...11.exe
windows10-2004-x64
10$APPDATA/a...60.dll
windows7-x64
1$APPDATA/a...60.dll
windows10-2004-x64
1$APPDATA/a...60.dll
windows7-x64
1$APPDATA/a...60.dll
windows10-2004-x64
1$APPDATA/a...UI.dll
windows7-x64
1$APPDATA/a...UI.dll
windows10-2004-x64
1$APPDATA/a...op.dll
windows7-x64
1$APPDATA/a...op.dll
windows10-2004-x64
1$APPDATA/a...rs.exe
windows7-x64
3$APPDATA/a...rs.exe
windows10-2004-x64
3$APPDATA/a...im.dll
windows7-x64
3$APPDATA/a...im.dll
windows10-2004-x64
3$APPDATA/p...60.dll
windows7-x64
1$APPDATA/p...60.dll
windows10-2004-x64
1$APPDATA/p...ui.dll
windows7-x64
1$APPDATA/p...ui.dll
windows10-2004-x64
1$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/Towb...ia.dll
windows7-x64
3$TEMP/Towb...ia.dll
windows10-2004-x64
3$TEMP/gamps.exe
windows7-x64
10$TEMP/gamps.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/app_browser/25.opends60.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$APPDATA/app_browser/25.opends60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$APPDATA/app_browser/40.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/app_browser/40.opends60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$APPDATA/app_browser/MicrosoftVisualStudioWebUI.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/app_browser/MicrosoftVisualStudioWebUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$APPDATA/app_browser/VsWebSiteInterop.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/app_browser/VsWebSiteInterop.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$APPDATA/app_browser/aspnetregbrowsers.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$APPDATA/app_browser/aspnetregbrowsers.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$APPDATA/app_browser/mscortim.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$APPDATA/app_browser/mscortim.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$APPDATA/postinfo/34.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$APPDATA/postinfo/34.opends60.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$APPDATA/postinfo/rcxditui.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$APPDATA/postinfo/rcxditui.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/advsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/advsplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral23
Sample
$TEMP/TowbarHamartia.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$TEMP/TowbarHamartia.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$TEMP/gamps.exe
Resource
win7-20240903-en
General
-
Target
IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe
-
Size
1.0MB
-
MD5
f386cbc90a1eb84a3f6e287911320dfe
-
SHA1
cabe3ee72469a5cd4b68d3de461bc421082ae297
-
SHA256
59ccd48279374377ac38f767764df31243b433c33a0df39daf005d950b5efba8
-
SHA512
f8fd87da4ef78a2738922eb2e7c2b58f19efe3480328a9bd0ec9c1bef638418e15cfc6f5516855be2aef65d0916724ebb975b5fd4646c5b39691a5ec2d93bb69
-
SSDEEP
24576:LwgszDzEY4Ecy7DbDTafOuDZ/myydIESihr2eOkaHYmwmeBQSTG:u7r97D/TJuFbBN6ckaHYHVQGG
Malware Config
Extracted
remcos
2.5.0 Pro
DECIMO
decimoremcdns.duckdns.org:1011
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-EXFS95
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 39 4760 cmd.exe 42 4760 cmd.exe 46 4760 cmd.exe 54 4760 cmd.exe 55 4760 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4436 gamps.exe -
Loads dropped DLL 1 IoCs
pid Process 4436 gamps.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\cliconfg.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4436 gamps.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4436 gamps.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4760 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4436 4104 IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe 86 PID 4104 wrote to memory of 4436 4104 IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe 86 PID 4104 wrote to memory of 4436 4104 IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe 86 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88 PID 4436 wrote to memory of 4760 4436 gamps.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe"C:\Users\Admin\AppData\Local\Temp\IIMG1245950021323IMAGN09756912IMAGENVISTAPREVIA0129100011.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\gamps.exeC:\Users\Admin\AppData\Local\Temp\gamps.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
938KB
MD5e57f5208e4a14649ea10092961df9b27
SHA1710d337ae00da50d558962cf8f826d2ce3eb62f9
SHA256242e61580f7d39a582fcc66d48cc41d6edb0941a01b4054d614c40ef7c87fd8e
SHA51241a7785322eed67798caac24df3b2ff0eb750cc3220220ed1330242eaf6e074e1d8948edd50a2d5ff214290ee264d2f0254ce9a4d45a3ae264c3e6ce7a91f506
-
Filesize
54KB
MD5d65c8ac05fd814a0327588b6b485c43e
SHA15555dc0c343f857c4732683b4018a271b17a6ca0
SHA256030bcfc5c4629fff97b77925e1650c9bb9b267c1018f2fc754f90afc143522e1
SHA512a40aa752ba28afb4e4b40ebb551612a819876dde50414c9ff1c0bf6b46618ab9d7b459eca0262fc0b9a13a649123c37fede7b20db4b8f3344c81551041d86fa0
-
Filesize
39KB
MD5f4392de13dfac4aa804152adbd93e793
SHA1ee90e001945afde21dcd12d542f0eabb9f94f4a6
SHA25631ae1165f008db6195108f984d3fe495f10c6ac4a5f74bd365102f84b57d9aba
SHA51240bf82d364c757576c3d7897d6d7413b64089056a8279433b5d5a35ada7a01607754c29678afd9bada5934d49c26f800132d400c864b38234fba4017bcf01de4
-
Filesize
74B
MD5c652b30b20467e80d14dc0a7b8e3592b
SHA11628f10fdf5af348e9c77c05d238fcedd8417420
SHA256221096d6e590fdd005e8d195d60323fa41d889a09ab7551d137d14ba32390018
SHA512c37ef460b3fad01b894a44b8259e79b3ab403d3458ba933388dd1c18cfeceadb71938dd235a8ece80173a888094795ef16aa2d4a1c7867edf7a9a0c1a8fc5366