Analysis
-
max time kernel
178s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
06bd75f1686847255ba61a86ef69eb8a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06bd75f1686847255ba61a86ef69eb8a.exe
Resource
win10v2004-20241007-en
General
-
Target
06bd75f1686847255ba61a86ef69eb8a.exe
-
Size
5.1MB
-
MD5
06bd75f1686847255ba61a86ef69eb8a
-
SHA1
e11abefa20031ce5f497fcb59c57e2f143a81e38
-
SHA256
45cc400d38a6a3de5075d593718a2b63deddfc20fd97107cf01c0c0bee341adc
-
SHA512
eb7e035aab6b1c5496dc8cebd5bb700ecf3d761747814ed8fc9a8534f989c3c84854f6878b0d076a13ca0d2d10413c10828cbb043e052566129c7c73a23bf8a7
-
SSDEEP
49152:k9C6IGwcuCr4SOgkpEEd6HninHFdrSgoQt171nYQo7uK2oaAXIi847dmjPU7n+at:kM6FDEdjl46JHElSYwkaEIm7x/
Malware Config
Extracted
remcos
Voltarger
dfgdfghghfhfh.con-ip.com:1665
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-I3REIW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SprintDesignerEditor = "C:\\Users\\Admin\\Music\\SprintDesignerUpdater\\SprintVideoOculus.exe" 06bd75f1686847255ba61a86ef69eb8a.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06bd75f1686847255ba61a86ef69eb8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06bd75f1686847255ba61a86ef69eb8a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4064 06bd75f1686847255ba61a86ef69eb8a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4064 4748 06bd75f1686847255ba61a86ef69eb8a.exe 86 PID 4748 wrote to memory of 4064 4748 06bd75f1686847255ba61a86ef69eb8a.exe 86 PID 4748 wrote to memory of 4064 4748 06bd75f1686847255ba61a86ef69eb8a.exe 86 PID 4748 wrote to memory of 4064 4748 06bd75f1686847255ba61a86ef69eb8a.exe 86 PID 4748 wrote to memory of 4064 4748 06bd75f1686847255ba61a86ef69eb8a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\06bd75f1686847255ba61a86ef69eb8a.exe"C:\Users\Admin\AppData\Local\Temp\06bd75f1686847255ba61a86ef69eb8a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\06bd75f1686847255ba61a86ef69eb8a.exe"C:\Users\Admin\AppData\Local\Temp\06bd75f1686847255ba61a86ef69eb8a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD512fe19da88672d8b8fe97088391e0e6f
SHA1de188b251f0f0cd3a2048e84d15fad7351701e09
SHA25697cd5b24736e6a7df83232d8190e17ec424e21f6e8bd095fb6a5c015df1f1a83
SHA5123010946f9439d807fbc3ecbd7cd25fab12f87c677d444a6200f5faa6ccc9f73e895d4ad5ac1591bb23fa4da743048b9ea1fbdc2d44b10378b4623daf376277e2