Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
7b9844639ef183122af8383ce901b8e0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7b9844639ef183122af8383ce901b8e0.exe
Resource
win10v2004-20240802-en
General
-
Target
7b9844639ef183122af8383ce901b8e0.exe
-
Size
908KB
-
MD5
7b9844639ef183122af8383ce901b8e0
-
SHA1
87514d622f74e94720cd77243326dd8c8217dfae
-
SHA256
f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b
-
SHA512
c98ad33821fbe4f71480a3ea36133d47dafbbb41dda3c3dc31ff4d6755491ea42a5418179e3f7f9d27fddb55a9b933ae221650b850a53096c6a216d39e151bf0
-
SSDEEP
24576:XO++gHdGXYcihGy+XKjHjjxHqHlngC9fnfyQ5G/:XO++gHdGXYcT7XkjFHqHlgY6/
Malware Config
Extracted
remcos
RemoteHost
192.3.101.137:5980
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DO8TMQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3444 powershell.exe 2016 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 7b9844639ef183122af8383ce901b8e0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b9844639ef183122af8383ce901b8e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b9844639ef183122af8383ce901b8e0.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 2016 powershell.exe 3444 powershell.exe 4604 7b9844639ef183122af8383ce901b8e0.exe 2016 powershell.exe 3444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4604 7b9844639ef183122af8383ce901b8e0.exe Token: SeDebugPrivilege 3444 powershell.exe Token: SeDebugPrivilege 2016 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4992 7b9844639ef183122af8383ce901b8e0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3444 4604 7b9844639ef183122af8383ce901b8e0.exe 93 PID 4604 wrote to memory of 3444 4604 7b9844639ef183122af8383ce901b8e0.exe 93 PID 4604 wrote to memory of 3444 4604 7b9844639ef183122af8383ce901b8e0.exe 93 PID 4604 wrote to memory of 2016 4604 7b9844639ef183122af8383ce901b8e0.exe 95 PID 4604 wrote to memory of 2016 4604 7b9844639ef183122af8383ce901b8e0.exe 95 PID 4604 wrote to memory of 2016 4604 7b9844639ef183122af8383ce901b8e0.exe 95 PID 4604 wrote to memory of 3612 4604 7b9844639ef183122af8383ce901b8e0.exe 97 PID 4604 wrote to memory of 3612 4604 7b9844639ef183122af8383ce901b8e0.exe 97 PID 4604 wrote to memory of 3612 4604 7b9844639ef183122af8383ce901b8e0.exe 97 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99 PID 4604 wrote to memory of 4992 4604 7b9844639ef183122af8383ce901b8e0.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9844639ef183122af8383ce901b8e0.exe"C:\Users\Admin\AppData\Local\Temp\7b9844639ef183122af8383ce901b8e0.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7b9844639ef183122af8383ce901b8e0.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JhWUOJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JhWUOJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE8BA.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\7b9844639ef183122af8383ce901b8e0.exe"C:\Users\Admin\AppData\Local\Temp\7b9844639ef183122af8383ce901b8e0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d02ee5e944aab83798c01ef0a86f18f0
SHA15668868c9e4cced425105ffe2e636566b5b105b1
SHA256fa0c9ce03ff8631e32e1c822557697ce1f1f7236fea407dfc140349bd729558b
SHA5121f18dbbb287840c37506cb3d5ecfaa142ff59452267a8483314b9b7c6acc8baad6499bd9178c55776d2aa2817d3b47c337e77647be654244b682899126a3ecee
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD570a27d461580b8a74eb0124de074c94f
SHA1b6b320641a7d8c6924287872a9c9216b457f7469
SHA25682b80b94c772658f4b7c277a6063eec4642b5fc1e2350c5466d0524ce4d72e6b
SHA51221f36abe88757a6ffc54f1a071c21bcd6fbd8153d56ce7ee6788836932e0b6c819e1cb46ee82be63c66efdac90271e1e75066ec94bf6eb60f15c9909349b36e6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD52d96b470c72a8b50b8f7ec058e916e81
SHA164b2b46ca1005814b147ba3380a29b5ca4564c03
SHA25602c522bd3cd408df733ea2efa8c926a2f4866f0f94d05f7ae5b94fb669803602
SHA512c07903cdb44e2ec8615b4b9a2bf4f8ada6b5092eb367713bd8fb6900bdf8b3728824d2df40c85b335f5ee4a2705c89992fe0a30d9d5c952edff2e438b2d7484b