Analysis

  • max time kernel
    300s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 20:09

General

  • Target

    Oficio electrónico Cancelación de contrato 30 de septiembre.exe

  • Size

    894KB

  • MD5

    1d3139ed795f03b3a2cb411c618f30da

  • SHA1

    c9c9297bf7bbee2b8a7f4f8b0f8d7a8ef3f9bef6

  • SHA256

    21aa57e39d848dc9952c63ba19d5b3a885fb207fa168c63da49ae55f36bf5780

  • SHA512

    fa28836a274879ff6c66c2ee97c783a4bcabb387d827c226e27441a50de6817309d115fa2dfa4fc163ef81ebd799f5670e46f90a82a47b1c644bf253927a4683

  • SSDEEP

    24576:btLoVsoyvLPDF5EvJtLp4yG/oJHEXnb5:

Malware Config

Extracted

Family

remcos

Botnet

ZEPTA

C2

vuele45.con-ip.com:1836

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    asdsadfs

  • mouse_option

    false

  • mutex

    cbbanshhd-TXKEZD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\Oficio electrónico Cancelación de contrato 30 de septiembre.exe
        "C:\Users\Admin\AppData\Local\Temp\Oficio electrónico Cancelación de contrato 30 de septiembre.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1824
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\asdsadfs\logs.dat

      Filesize

      144B

      MD5

      3b144e3af4a9a2e669a717abbfe7f6e0

      SHA1

      142e943d676ee47033f92cebafc9c9f9703ba891

      SHA256

      82e52d176102779d191cc09481708e76b6459ea2223d2b219ddae62e0a25e515

      SHA512

      8724e274fd4526f1a530f57e182f3cc6127784432ca70fde077077f4dc496af52b645245c0231b5c59b835893b416c0b339d51992ff1c1c39af2130168dc46d2

    • memory/1824-0-0x000000007450E000-0x000000007450F000-memory.dmp

      Filesize

      4KB

    • memory/1824-1-0x0000000000850000-0x0000000000932000-memory.dmp

      Filesize

      904KB

    • memory/1824-2-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-3-0x0000000005C50000-0x0000000005D6E000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-4-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-15-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-13-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-11-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-9-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-7-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-5-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-28-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-21-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-19-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-33-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-67-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-65-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-63-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-61-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-59-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-57-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-53-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-51-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-49-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-47-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-45-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-43-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-41-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-39-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-37-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-35-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-31-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-29-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-25-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-23-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-56-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-17-0x0000000005C50000-0x0000000005D68000-memory.dmp

      Filesize

      1.1MB

    • memory/1824-1078-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-1080-0x0000000005F60000-0x0000000005FAC000-memory.dmp

      Filesize

      304KB

    • memory/1824-1079-0x0000000006000000-0x0000000006098000-memory.dmp

      Filesize

      608KB

    • memory/1824-1083-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-1084-0x000000007450E000-0x000000007450F000-memory.dmp

      Filesize

      4KB

    • memory/1824-1086-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-1087-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-1088-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1824-1089-0x0000000007950000-0x0000000007EF4000-memory.dmp

      Filesize

      5.6MB

    • memory/1824-1090-0x0000000006210000-0x0000000006264000-memory.dmp

      Filesize

      336KB

    • memory/1824-1100-0x0000000074500000-0x0000000074CB0000-memory.dmp

      Filesize

      7.7MB

    • memory/4100-1098-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4100-1111-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB