Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
Techline Services Inc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Techline Services Inc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hjfeu2x8wxnb82.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
hjfeu2x8wxnb82.dll
Resource
win10v2004-20240802-en
General
-
Target
Techline Services Inc.exe
-
Size
234KB
-
MD5
e2ccfaf4d44c36b5654174b3f341a2f9
-
SHA1
163ad4b931cf150d72b4408322f710d59fff96de
-
SHA256
cc17e0a75ce1d2770db5ab70177b9ffa3665d7c46290a9c61deef05e41fb48f2
-
SHA512
8b291eea1e2458ac3c6c5a97ceeb7184a672496da75f758249e6ac7f0533612610f286bfd203ea667017b880ca79fa58c392b4e62bed8ada4c0b14831c392fe9
-
SSDEEP
3072:SBkfJpRXATwMdFCcv6k3bpcmH0IvkHEq8bvgjSZiU/2MeQMMoc4EDJgTR7T9AD1s:SqjIprpvLoa532Goc42JERY1U8acYt
Malware Config
Extracted
remcos
2.7.2 Pro
grace and mercy logs
103.153.77.83:4348
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Execel.exe
-
copy_folder
Execel
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Execel
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Execel-X7W93K
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Execel
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2280 Techline Services Inc.exe 2280 Techline Services Inc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2848 2280 Techline Services Inc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Techline Services Inc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Techline Services Inc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2280 Techline Services Inc.exe 2280 Techline Services Inc.exe 2280 Techline Services Inc.exe 2280 Techline Services Inc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2280 Techline Services Inc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 Techline Services Inc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2848 2280 Techline Services Inc.exe 30 PID 2280 wrote to memory of 2848 2280 Techline Services Inc.exe 30 PID 2280 wrote to memory of 2848 2280 Techline Services Inc.exe 30 PID 2280 wrote to memory of 2848 2280 Techline Services Inc.exe 30 PID 2280 wrote to memory of 2848 2280 Techline Services Inc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Techline Services Inc.exe"C:\Users\Admin\AppData\Local\Temp\Techline Services Inc.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Techline Services Inc.exe"C:\Users\Admin\AppData\Local\Temp\Techline Services Inc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5c5aeacd25be37723c7ffaab31ad6d639
SHA1f5364bdbb0b85f15b61db6ddfea44d904481df46
SHA2565b46289cb721008f2125b81abbe28be5ce09c9aafdbb19139b6f77ce921c0bc8
SHA5123dc1b6d8b86674297d872efbbd9c3295a39d8ec9bf082982aea94de658d917e4b63ad762b8e1a738d29d06875625363fa02329a3cb5d48d9f40ba100145b98fe
-
Filesize
74B
MD509b5a7a489f156a407908ad172d75bd0
SHA1066a60b660329377a22811257eac375464627c3f
SHA2566a3bf67f4b7c3273dd992f3802d0564b45512b57715d16defab825031fb966a8
SHA51254619737bc57e780e5da516d6272e331e74a327f5f8a266f9225cbdba9d0f70c2f993fe48e25331e781db13f37e6d152ef0da71121ab5fdaa17a33ab75d9d29e
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c