Analysis
-
max time kernel
180s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
9b4d402327b70396ae3e25c992497d55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b4d402327b70396ae3e25c992497d55.exe
Resource
win10v2004-20241007-en
General
-
Target
9b4d402327b70396ae3e25c992497d55.exe
-
Size
7.5MB
-
MD5
9b4d402327b70396ae3e25c992497d55
-
SHA1
2a90004d00f4d87f18796e3b3393442e553eb028
-
SHA256
b9820aff79bcbcf633402ec83d092c86af0f3de711cb6877e11b272b3c4e886e
-
SHA512
4a53ff055e60d95ecd9a6cee76354857e094c09405cad410bee00a3a472042546200ee7bc5e2d73bb9c620894f2668b2a8e22940f5178711c5c8f349eeba0864
-
SSDEEP
98304:CKp5jJ5EVOzW8VrAqZkeNcX3NU3dW2/GSUJWXKtOLXfYxeZVSNbC+vw/qiYl7EqW:CEjJ5TpZkeNctAIJEivS0UE9s
Malware Config
Extracted
remcos
03"""""OCtubre"""""2024
098urni4389udn3u4imf8rufue.con-ip.com:5023
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AMNTDK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4d402327b70396ae3e25c992497d55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4d402327b70396ae3e25c992497d55.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 9b4d402327b70396ae3e25c992497d55.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31 PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31 PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31 PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31 PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31 PID 2704 wrote to memory of 2928 2704 9b4d402327b70396ae3e25c992497d55.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5021bd357bc79ad8d084c17c6a7053874
SHA17a5bb7602d92300c625057b2626d08c7829c473a
SHA25664b01e997fad3b1056a12f8f80e6623659bfa9863935a4cc8d5860269623c916
SHA51249348486e79afaa972e4fdbd5372901e0fabd14b05d15f69999a70daf94ccf00782eddea89ff91d56986279b3946fd4c84f1d52387a604105035f9e967f12086