Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
04db1598bdd84ac10adb5ebef639f628.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04db1598bdd84ac10adb5ebef639f628.exe
Resource
win10v2004-20241007-en
General
-
Target
04db1598bdd84ac10adb5ebef639f628.exe
-
Size
3.1MB
-
MD5
04db1598bdd84ac10adb5ebef639f628
-
SHA1
16d9a3c85f2e56e13e22a4417f9215d7cad8d2a7
-
SHA256
9c843456235244f095b5e021ca82e4805cd94ac732ae8b7a35a021f18117637c
-
SHA512
b20c0840aebf19dd7d0f3bd07b7794122db99fd4e6d78ff5ac0d2e7a08be2f1047398aef36edeeda79062946433ec793eda84c6cf8dae8937ac5762be5760385
-
SSDEEP
49152:lWkFpCF7XzYXDESpbRSNH8Sc7e6TKJGnVr1V2V/VyqhPzS+tYTEy:lVFpG7XzFFc7e9JGnVx+/VdPzSdR
Malware Config
Extracted
remcos
FRESA
segurosbolivar24.con-ip.com:2006
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
regis
-
mouse_option
false
-
mutex
mnhdgtdhjaukdjnsbhdioz-Z6YHMX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Deletes itself 1 IoCs
pid Process 1492 WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\FireDesignerEditor = "C:\\Users\\Admin\\Music\\FireDesignerUpdater\\FireVideo.exe" 04db1598bdd84ac10adb5ebef639f628.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04db1598bdd84ac10adb5ebef639f628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04db1598bdd84ac10adb5ebef639f628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2940 04db1598bdd84ac10adb5ebef639f628.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 1508 wrote to memory of 2940 1508 04db1598bdd84ac10adb5ebef639f628.exe 30 PID 2940 wrote to memory of 1492 2940 04db1598bdd84ac10adb5ebef639f628.exe 32 PID 2940 wrote to memory of 1492 2940 04db1598bdd84ac10adb5ebef639f628.exe 32 PID 2940 wrote to memory of 1492 2940 04db1598bdd84ac10adb5ebef639f628.exe 32 PID 2940 wrote to memory of 1492 2940 04db1598bdd84ac10adb5ebef639f628.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\uuaxs.vbs"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD536f370aed01c538ad19605b87790a578
SHA15da2f5e32ab5b1f90e07f581516b2c8f91719d25
SHA25683e4fae39e5afe5a7b41099e49c6e4c4808a0832297d112de449b8cc53ad2b8d
SHA51260be56f34d00396039e27ee9ae711d629f57392d45e9863967ba860d8067d093007d70847a8f7acd844d51cfe9a8c39baf1be3f3b8fbdde70dce58caeb66ee3c