Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
scan00093944.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scan00093944.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
scan00093944.pdf.exe
-
Size
1.6MB
-
MD5
1a2e594a704d93994d0f361d24230eda
-
SHA1
d7ce5cc39741222c2739081dd7171de223897b11
-
SHA256
36336b168fdd5dcf5172b9f91137d58e8747c4c263b505f303255a91be62bafb
-
SHA512
68929288d281743071dcec104e26f154a1520b895937954373427f01ff70f838e4a7c377b3dcfdbe94febf14560578d218339c06797a0cffce4e3ababfd9543a
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL13DTHOVaB7LekaKaLaU9fEkC2iSKyf+l:f3v+7/5QLZTuy7Le+aT95myW
Malware Config
Extracted
remcos
RemoteHost1
tochisglobal.ddnsking.com:6426
tochisglobal.ddns.net:6426
backups1122.duckdns.org:6426
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-KS7514
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2804 3052 scan00093944.pdf.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan00093944.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3052 scan00093944.pdf.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2804 3052 scan00093944.pdf.exe 31 PID 3052 wrote to memory of 2804 3052 scan00093944.pdf.exe 31 PID 3052 wrote to memory of 2804 3052 scan00093944.pdf.exe 31 PID 3052 wrote to memory of 2804 3052 scan00093944.pdf.exe 31 PID 3052 wrote to memory of 2804 3052 scan00093944.pdf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan00093944.pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan00093944.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\scan00093944.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2804
-