Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
8560d2cdf6bd8ffb30fe031081360c1f.exe
Resource
win7-20240903-en
General
-
Target
8560d2cdf6bd8ffb30fe031081360c1f.exe
-
Size
1024.0MB
-
MD5
a832f6cf4b13db85c4e3d4a5c563800d
-
SHA1
af788bb64b532ad62a64af98f6eeec316efcbd72
-
SHA256
52e9fae2db9e0b5af5c4e28c52508a482348c085fd83e3a2d549c5d676b24470
-
SHA512
7ee6c7c5529ee55f642c79d1ccd160e1d8183b13edf216a9693163f9acf84c6d355dcd028c41c1f022bc1799ba8852eff30f78e3ea68fa505b606e46c08c2547
-
SSDEEP
12288:75RVeIv1Jyhik2XF62YPtnsMg9t4q78cjNgT8Yz48h7UJ:9RVeIv1JygrV6XtsRVUS81UJ
Malware Config
Extracted
remcos
PLATA
comercio43.con-ip.com:1835
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
data34
-
mouse_option
false
-
mutex
kiustong-7N6PEP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1504 AppData.exe 2460 AppData.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1100 set thread context of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1504 set thread context of 2508 1504 AppData.exe 111 PID 2460 set thread context of 3052 2460 AppData.exe 120 -
Program crash 1 IoCs
pid pid_target Process procid_target 752 3604 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppData.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8560d2cdf6bd8ffb30fe031081360c1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppData.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3644 schtasks.exe 1684 schtasks.exe 3528 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2508 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 3604 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 90 PID 1100 wrote to memory of 4496 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 91 PID 1100 wrote to memory of 4496 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 91 PID 1100 wrote to memory of 4496 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 91 PID 1100 wrote to memory of 1732 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 94 PID 1100 wrote to memory of 1732 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 94 PID 1100 wrote to memory of 1732 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 94 PID 1732 wrote to memory of 3644 1732 cmd.exe 97 PID 1732 wrote to memory of 3644 1732 cmd.exe 97 PID 1732 wrote to memory of 3644 1732 cmd.exe 97 PID 1100 wrote to memory of 4396 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 98 PID 1100 wrote to memory of 4396 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 98 PID 1100 wrote to memory of 4396 1100 8560d2cdf6bd8ffb30fe031081360c1f.exe 98 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 2508 1504 AppData.exe 111 PID 1504 wrote to memory of 1384 1504 AppData.exe 112 PID 1504 wrote to memory of 1384 1504 AppData.exe 112 PID 1504 wrote to memory of 1384 1504 AppData.exe 112 PID 1504 wrote to memory of 3448 1504 AppData.exe 114 PID 1504 wrote to memory of 3448 1504 AppData.exe 114 PID 1504 wrote to memory of 3448 1504 AppData.exe 114 PID 3448 wrote to memory of 1684 3448 cmd.exe 116 PID 3448 wrote to memory of 1684 3448 cmd.exe 116 PID 3448 wrote to memory of 1684 3448 cmd.exe 116 PID 1504 wrote to memory of 2324 1504 AppData.exe 117 PID 1504 wrote to memory of 2324 1504 AppData.exe 117 PID 1504 wrote to memory of 2324 1504 AppData.exe 117 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3052 2460 AppData.exe 120 PID 2460 wrote to memory of 3152 2460 AppData.exe 121 PID 2460 wrote to memory of 3152 2460 AppData.exe 121 PID 2460 wrote to memory of 3152 2460 AppData.exe 121 PID 2460 wrote to memory of 1588 2460 AppData.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\8560d2cdf6bd8ffb30fe031081360c1f.exe"C:\Users\Admin\AppData\Local\Temp\8560d2cdf6bd8ffb30fe031081360c1f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 6483⤵
- Program crash
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\8560d2cdf6bd8ffb30fe031081360c1f.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1284,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=3032 /prefetch:81⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3604 -ip 36041⤵PID:3112
-
C:\Users\Admin\AppData\Roaming\AppData\AppData.exeC:\Users\Admin\AppData\Roaming\AppData\AppData.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\AppData\AppData.exeC:\Users\Admin\AppData\Roaming\AppData\AppData.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\AppData"2⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f2⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\AppData\AppData.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe" "C:\Users\Admin\AppData\Roaming\AppData\AppData.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5de11d2b4594a0425bd2891e9a66463b4
SHA16441434b69ee3685399828f4ade1a01a9fe080e1
SHA256832c67788d47ae644af5ad4f133f29cbeee147c1eec8507c3f44bd0bebe6826a
SHA512f8c52515417f0a08b51da8c94b1efdd1ae13fc021a15ffe13a2e1b5ebcaa9a7d1ef464b94c152a85deb8fc7fa00e2396a1db7fd08ce2a19fd14e67cee4808aad
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1