Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
3035773a6fd96df3c95f7b3c966cc204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3035773a6fd96df3c95f7b3c966cc204.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
3035773a6fd96df3c95f7b3c966cc204.exe
-
Size
431KB
-
MD5
3035773a6fd96df3c95f7b3c966cc204
-
SHA1
8edaa8a7551b35e08e4ba8574a29440023813e85
-
SHA256
3651fbb3c17ca4bc7590476dad23c1fbd773bc3595313d87ac23eff91c203586
-
SHA512
1fbb1e59e9999bed11f15dace727c745fa788f0d26cf887b924670eead5b1ece5a6ed9c8702f0d83c71734fefd95893bf06fbdb3cb6b52e777ca4ae2c7fa40e7
-
SSDEEP
12288:AgGlyn9K5Fy1sDLwdr0jD2O7yvZ4Gl1Wb6:AgEUc58sfPjdGuUWb6
Malware Config
Extracted
remcos
GRACE&SUCCESS
eweo9264gtuiort.duckdns.org:22740
eweo9264gtuiort.duckdns.org:35966
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
great.dat
-
keylog_flag
false
-
keylog_folder
great
-
mouse_option
false
-
mutex
Rmc-GEOGQB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 384 3035773a6fd96df3c95f7b3c966cc204.exe 384 3035773a6fd96df3c95f7b3c966cc204.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Genoptrykkes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Anodise\\Indprentede173.exe" 3035773a6fd96df3c95f7b3c966cc204.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 drive.google.com 20 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\leiotrichine.cra 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4168 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 384 3035773a6fd96df3c95f7b3c966cc204.exe 4168 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 384 set thread context of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\unneutralize.Exe 3035773a6fd96df3c95f7b3c966cc204.exe File opened for modification C:\Program Files (x86)\Common Files\Indhak.non 3035773a6fd96df3c95f7b3c966cc204.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\inspicalr\casimeres.ini 3035773a6fd96df3c95f7b3c966cc204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3035773a6fd96df3c95f7b3c966cc204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 384 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4168 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 384 wrote to memory of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88 PID 384 wrote to memory of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88 PID 384 wrote to memory of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88 PID 384 wrote to memory of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88 PID 384 wrote to memory of 4168 384 3035773a6fd96df3c95f7b3c966cc204.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472