Analysis
-
max time kernel
177s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win10v2004-20240910-en
General
-
Target
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
-
Size
3.7MB
-
MD5
bc7c2b5cecb62ddda8ab33eaaa7abf65
-
SHA1
e8ea016e57a0e87b90f8afbce0eee6bc1afd8bfb
-
SHA256
0e875809afec874bbbdd8395efac33c3e57bd86a66ae4097c87b35656b64804c
-
SHA512
6a57c650fad469b71f81fa488a555919f7dccfe45b501b0930285a36dc4e705faa710bf6a0c27828ec720494c89baa8d7d95fc6e752f6221f7a32bf1abcfa112
-
SSDEEP
49152:DC8nc/DY7yJiS/t8Tk6SRdkpvRFpybpxNYPMI3+bEmnT:DCv/lRRd8FpybHaEIy
Malware Config
Extracted
remcos
XOAOAMORT
carroosmfjdjs.con-ip.com:1661
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BTGK97
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\SatPCEditor = "C:\\Users\\Admin\\Music\\SatPCUpdater\\SatPCOculus.exe" bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1988 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31 PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31 PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31 PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31 PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31 PID 2432 wrote to memory of 1988 2432 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD59eb56240582279345a0789ef9129ebc6
SHA107521c2a58b7d1c6a0f37a18796f42a679adac42
SHA25616ad903d4dd2dc8cb210be2c3742ae2500a043231c3662126d9322ea0dbfaabe
SHA5127d2aee8c19427dab1305091f0a4ba2acb077a02778f0cd1c358f44bbc2ad33996ff3ae98ba6af90bd57753149834e2f4c31f8ec9da5db9e9986b4af7885f4810