Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
PO320.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO320.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
PO320.exe
-
Size
615KB
-
MD5
e9fccc1648186d0d9d291b3b481dce31
-
SHA1
47039fcdd8bb71f4f1bdd6aeeecd2df1cce22adb
-
SHA256
057ca391a027c4f82e79fcb660fa61c762fab0bc38b14e94bc387b79faaa578f
-
SHA512
8be8bdaf238981a2817343f4147ef9a9447a02826f2f209940cb5bd5570721b8759350a91c754e9a57661a3b4ffa39fd41c17a7234b5052b9960a2d90dddcee9
-
SSDEEP
12288:5bt4OfA5VIfIUXR66S1UVvFWOd+qUhQqUWjGKPFA:5buOfAUfIUh654vgshcy
Malware Config
Extracted
remcos
SEPT22
66.154.112.195:4500
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-27W2HG
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2156 PO320.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Fiskemelsfabrikkers192.exe" PO320.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1760 PO320.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2156 PO320.exe 1760 PO320.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 1760 2156 PO320.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\borers.Ple85 PO320.exe File opened for modification C:\Program Files (x86)\automobility.Spa PO320.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\vivisects\seasons.ini PO320.exe File opened for modification C:\Windows\Fonts\Marines\Hermodactyl202.sup PO320.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO320.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2156 PO320.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1760 2156 PO320.exe 31 PID 2156 wrote to memory of 1760 2156 PO320.exe 31 PID 2156 wrote to memory of 1760 2156 PO320.exe 31 PID 2156 wrote to memory of 1760 2156 PO320.exe 31 PID 2156 wrote to memory of 1760 2156 PO320.exe 31 PID 2156 wrote to memory of 1760 2156 PO320.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO320.exe"C:\Users\Admin\AppData\Local\Temp\PO320.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\PO320.exe"C:\Users\Admin\AppData\Local\Temp\PO320.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88