Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win10v2004-20240802-en
General
-
Target
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
-
Size
3.7MB
-
MD5
bc7c2b5cecb62ddda8ab33eaaa7abf65
-
SHA1
e8ea016e57a0e87b90f8afbce0eee6bc1afd8bfb
-
SHA256
0e875809afec874bbbdd8395efac33c3e57bd86a66ae4097c87b35656b64804c
-
SHA512
6a57c650fad469b71f81fa488a555919f7dccfe45b501b0930285a36dc4e705faa710bf6a0c27828ec720494c89baa8d7d95fc6e752f6221f7a32bf1abcfa112
-
SSDEEP
49152:DC8nc/DY7yJiS/t8Tk6SRdkpvRFpybpxNYPMI3+bEmnT:DCv/lRRd8FpybHaEIy
Malware Config
Extracted
remcos
XOAOAMORT
carroosmfjdjs.con-ip.com:1661
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BTGK97
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SatPCEditor = "C:\\Users\\Admin\\Music\\SatPCUpdater\\SatPCOculus.exe" bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1636 2972 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 82 PID 2972 wrote to memory of 1636 2972 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 82 PID 2972 wrote to memory of 1636 2972 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 82 PID 2972 wrote to memory of 1636 2972 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 82 PID 2972 wrote to memory of 1636 2972 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5f37a7da6859ede9e04ff5f1762ea8348
SHA10e82fee5a1bc64a03e2db7a8d4422e92b0f5303c
SHA256581f2e50823ea8d3dd0fdc0b5f74641c7f820f170b50223d3ffcb1e8a583d3fb
SHA512573f2ad55b288729f5a4518e5ab4ff25695b2c9773da7b6b71be46fbf750297d3a80ebb9560b33411b43ab30e76ada34f700042e1d01169d177b4fc7cc3ca975