Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
04db1598bdd84ac10adb5ebef639f628.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04db1598bdd84ac10adb5ebef639f628.exe
Resource
win10v2004-20241007-en
General
-
Target
04db1598bdd84ac10adb5ebef639f628.exe
-
Size
3.1MB
-
MD5
04db1598bdd84ac10adb5ebef639f628
-
SHA1
16d9a3c85f2e56e13e22a4417f9215d7cad8d2a7
-
SHA256
9c843456235244f095b5e021ca82e4805cd94ac732ae8b7a35a021f18117637c
-
SHA512
b20c0840aebf19dd7d0f3bd07b7794122db99fd4e6d78ff5ac0d2e7a08be2f1047398aef36edeeda79062946433ec793eda84c6cf8dae8937ac5762be5760385
-
SSDEEP
49152:lWkFpCF7XzYXDESpbRSNH8Sc7e6TKJGnVr1V2V/VyqhPzS+tYTEy:lVFpG7XzFFc7e9JGnVx+/VdPzSdR
Malware Config
Extracted
remcos
FRESA
segurosbolivar24.con-ip.com:2006
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
regis
-
mouse_option
false
-
mutex
mnhdgtdhjaukdjnsbhdioz-Z6YHMX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 04db1598bdd84ac10adb5ebef639f628.exe -
Deletes itself 1 IoCs
pid Process 3412 WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FireDesignerEditor = "C:\\Users\\Admin\\Music\\FireDesignerUpdater\\FireVideo.exe" 04db1598bdd84ac10adb5ebef639f628.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04db1598bdd84ac10adb5ebef639f628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04db1598bdd84ac10adb5ebef639f628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 04db1598bdd84ac10adb5ebef639f628.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2392 04db1598bdd84ac10adb5ebef639f628.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3116 wrote to memory of 2392 3116 04db1598bdd84ac10adb5ebef639f628.exe 85 PID 3116 wrote to memory of 2392 3116 04db1598bdd84ac10adb5ebef639f628.exe 85 PID 3116 wrote to memory of 2392 3116 04db1598bdd84ac10adb5ebef639f628.exe 85 PID 3116 wrote to memory of 2392 3116 04db1598bdd84ac10adb5ebef639f628.exe 85 PID 3116 wrote to memory of 2392 3116 04db1598bdd84ac10adb5ebef639f628.exe 85 PID 2392 wrote to memory of 3412 2392 04db1598bdd84ac10adb5ebef639f628.exe 87 PID 2392 wrote to memory of 3412 2392 04db1598bdd84ac10adb5ebef639f628.exe 87 PID 2392 wrote to memory of 3412 2392 04db1598bdd84ac10adb5ebef639f628.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"C:\Users\Admin\AppData\Local\Temp\04db1598bdd84ac10adb5ebef639f628.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\nizcnvjhaqagsjxumsftflclysychnk.vbs"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD536f370aed01c538ad19605b87790a578
SHA15da2f5e32ab5b1f90e07f581516b2c8f91719d25
SHA25683e4fae39e5afe5a7b41099e49c6e4c4808a0832297d112de449b8cc53ad2b8d
SHA51260be56f34d00396039e27ee9ae711d629f57392d45e9863967ba860d8067d093007d70847a8f7acd844d51cfe9a8c39baf1be3f3b8fbdde70dce58caeb66ee3c