Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
z000023947538734FACELECTRONICAPDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
z000023947538734FACELECTRONICAPDF.exe
Resource
win10v2004-20240802-en
General
-
Target
z000023947538734FACELECTRONICAPDF.exe
-
Size
7.5MB
-
MD5
d5a3c4222b087ecabf47ffa4b4b05ec1
-
SHA1
32aa6710e55e113c578904884ce9dafc47d907d8
-
SHA256
4b42ed6bfed1bd64fbcc07e4ef108ae715802d54f2d7b1268aeab39d8a2966e8
-
SHA512
c278b8c64238d3d313c2d76506c545981a891404a20595679c35f4e10f7de3eaf028967ea1b9ab0c64c7bd48f2a8b90cd070e7c51a142de7d7d37bd216742d45
-
SSDEEP
98304:z5djeXAhCy1HDJQv8kVH0WUjqqTnYRoeEgmn1NX+6fnUXSvPLOqq21R2ajvLjgdR:z5djUAhCy1dUVx3vinLVdXMakf
Malware Config
Extracted
remcos
20???Septiem��2024
ufye28738bd3yv23d783.con-ip.com:5023
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-WM7NR4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Express = "C:\\Users\\Admin\\Pictures\\MonaLisa\\HunterExpress.exe" z000023947538734FACELECTRONICAPDF.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z000023947538734FACELECTRONICAPDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z000023947538734FACELECTRONICAPDF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 z000023947538734FACELECTRONICAPDF.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2256 2712 z000023947538734FACELECTRONICAPDF.exe 89 PID 2712 wrote to memory of 2256 2712 z000023947538734FACELECTRONICAPDF.exe 89 PID 2712 wrote to memory of 2256 2712 z000023947538734FACELECTRONICAPDF.exe 89 PID 2712 wrote to memory of 2256 2712 z000023947538734FACELECTRONICAPDF.exe 89 PID 2712 wrote to memory of 2256 2712 z000023947538734FACELECTRONICAPDF.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\z000023947538734FACELECTRONICAPDF.exe"C:\Users\Admin\AppData\Local\Temp\z000023947538734FACELECTRONICAPDF.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\z000023947538734FACELECTRONICAPDF.exe"C:\Users\Admin\AppData\Local\Temp\z000023947538734FACELECTRONICAPDF.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5cf446578eaa62b8e94ddb41685d4e22b
SHA1cca4daf3eee2b7c69be8e7d70b43d4639c08a21e
SHA25611a0546047c8c520045fe137c96825ea832ef64da0984e3251269b54bc46fac7
SHA512f7aa4d16b87f4821883e737d6cce9b89968c3c7fe6bcd79d4ebdf9a9a937321e8c40eb7a5828426ba86a3d316792a79898876becbf052a68e604e14f256b1edd