Analysis
-
max time kernel
178s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
ee1e59674071a1c4541fbaf6f6f582cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee1e59674071a1c4541fbaf6f6f582cc.exe
Resource
win10v2004-20240802-en
General
-
Target
ee1e59674071a1c4541fbaf6f6f582cc.exe
-
Size
379KB
-
MD5
ee1e59674071a1c4541fbaf6f6f582cc
-
SHA1
f1b3689389c286197e297a903942d20d3527d2c0
-
SHA256
e6142fe26f2b69d6a0c29383eda5ba3ea883d706aa86f406a79668a346907d34
-
SHA512
dd3d6dc531b453da6b583da7e0ec40b2f25ebe541ae0a0189d07be4a95491e1d6174c3b2cc9cf97d7fa773991b1fc4b4335e1cc9fa305c6c253fd451474e7e5e
-
SSDEEP
384:zYfZf7DceK5eDKe5Teuek41UQFn0FWkorqVsiEsbTGETNkrMX4mT6h8CfsqbPpwW:+ZaiKFnQoWTxglb83Yi3iPmbLDC
Malware Config
Extracted
remcos
nuevo5
1octubre2024.con-ip.com:1510
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
nuevo5
-
mouse_option
false
-
mutex
oplkueyojnasuirowqyimcnnvjhfs-QWYDDX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5052 created 3420 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 55 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bmfrope = "C:\\Users\\Admin\\AppData\\Roaming\\Bmfrope.exe" ee1e59674071a1c4541fbaf6f6f582cc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5052 set thread context of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1e59674071a1c4541fbaf6f6f582cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe Token: SeDebugPrivilege 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4708 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88 PID 5052 wrote to memory of 4708 5052 ee1e59674071a1c4541fbaf6f6f582cc.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\ee1e59674071a1c4541fbaf6f6f582cc.exe"C:\Users\Admin\AppData\Local\Temp\ee1e59674071a1c4541fbaf6f6f582cc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4708
-