Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
ad09004806090002400031237.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad09004806090002400031237.exe
Resource
win10v2004-20241007-en
General
-
Target
ad09004806090002400031237.exe
-
Size
5.1MB
-
MD5
50e54f3131a1419a0fdac1ec360f300d
-
SHA1
26254b070e011dd49087d611184ed85af9f1d740
-
SHA256
7e5d3ca04246a2e61ccf5c307918079001015c5e6f5b1feaa541423949eb444a
-
SHA512
c93105279cfd4529a8dfa820f059fc92bf698b1441b464f9362dca0277130cb275d66711b4ed4725dc94fdf6070e9c1245a1b63fbcba5c7f9a35c7072003cb4b
-
SSDEEP
49152:c9C6IGwcuCr4SOgkpEEd6HninHFdrSgoQg3gMKnlSYwoNYPMI3+IwXUio3:cM6FDEdjl46KElSYwoaEI5ao3
Malware Config
Extracted
remcos
FORTUNAA
octubre7.con-ip.com:7770
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Y277U9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SprintDesignerEditor = "C:\\Users\\Admin\\Music\\SprintDesignerUpdater\\SprintVideoOculus.exe" ad09004806090002400031237.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad09004806090002400031237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad09004806090002400031237.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1912 ad09004806090002400031237.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1912 4304 ad09004806090002400031237.exe 84 PID 4304 wrote to memory of 1912 4304 ad09004806090002400031237.exe 84 PID 4304 wrote to memory of 1912 4304 ad09004806090002400031237.exe 84 PID 4304 wrote to memory of 1912 4304 ad09004806090002400031237.exe 84 PID 4304 wrote to memory of 1912 4304 ad09004806090002400031237.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad09004806090002400031237.exe"C:\Users\Admin\AppData\Local\Temp\ad09004806090002400031237.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\ad09004806090002400031237.exe"C:\Users\Admin\AppData\Local\Temp\ad09004806090002400031237.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD550a82f3377ea9454c3769b2ced0e4a3c
SHA16b1e4f1ed409551207a8137e2497bbe87e9c3b49
SHA256797b967e5221d81eb54f2a69cf3a4d2a5445426f93296f847033c3a90172ccaf
SHA5129301fad043fb3d1f8af8b7f97919b11fef18ab20bc28df24557313f95d4e8301a920bb97925974cc012e3ec84cf2ab814a55e322945a1f78ab70700abe097629