Analysis
-
max time kernel
178s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
9b4d402327b70396ae3e25c992497d55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b4d402327b70396ae3e25c992497d55.exe
Resource
win10v2004-20241007-en
General
-
Target
9b4d402327b70396ae3e25c992497d55.exe
-
Size
7.5MB
-
MD5
9b4d402327b70396ae3e25c992497d55
-
SHA1
2a90004d00f4d87f18796e3b3393442e553eb028
-
SHA256
b9820aff79bcbcf633402ec83d092c86af0f3de711cb6877e11b272b3c4e886e
-
SHA512
4a53ff055e60d95ecd9a6cee76354857e094c09405cad410bee00a3a472042546200ee7bc5e2d73bb9c620894f2668b2a8e22940f5178711c5c8f349eeba0864
-
SSDEEP
98304:CKp5jJ5EVOzW8VrAqZkeNcX3NU3dW2/GSUJWXKtOLXfYxeZVSNbC+vw/qiYl7EqW:CEjJ5TpZkeNctAIJEivS0UE9s
Malware Config
Extracted
remcos
03"""""OCtubre"""""2024
098urni4389udn3u4imf8rufue.con-ip.com:5023
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-AMNTDK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4d402327b70396ae3e25c992497d55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4d402327b70396ae3e25c992497d55.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3552 9b4d402327b70396ae3e25c992497d55.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3552 4680 9b4d402327b70396ae3e25c992497d55.exe 84 PID 4680 wrote to memory of 3552 4680 9b4d402327b70396ae3e25c992497d55.exe 84 PID 4680 wrote to memory of 3552 4680 9b4d402327b70396ae3e25c992497d55.exe 84 PID 4680 wrote to memory of 3552 4680 9b4d402327b70396ae3e25c992497d55.exe 84 PID 4680 wrote to memory of 3552 4680 9b4d402327b70396ae3e25c992497d55.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"C:\Users\Admin\AppData\Local\Temp\9b4d402327b70396ae3e25c992497d55.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD523830898f18ce1e9e800004809ee073a
SHA13dbdc9c6c7529d73587328dee6efb3b5bccabe09
SHA25692651611eb8dcc11aecb25b2d8c18769ace137bbc51155a82c38cac3f1f59721
SHA512b6d262537eca2605ecc1503921a8b5e98b2ca386dc204b296281ac6313cda5cb8b64d5557452b9e6167ec6675d36b2dee9f2c04486c143417f793fe82d12195b