Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe
Resource
win10v2004-20241007-en
General
-
Target
INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe
-
Size
2.4MB
-
MD5
9e5634a01e241113ddc1a5a03265cd3e
-
SHA1
17f3cba192f573754797b1fb6f644889f9abaaca
-
SHA256
a8c0001bf62a178870fe526395703f682143078ad37d9b20e50f230dd9059648
-
SHA512
3cea7ff14f48832b7ca955a5fa2c61115b1f2a5ec9f8df52e32692b07d9d34453fef29ef1d7c62ec666e0f38a4899a89db4a68f615602d267c0103d42fe52156
-
SSDEEP
49152:7lnKF46FKC9PgROSeQ146cDPM2vCVapdoqwicf1/y36sbwAE1JgZIESTcNYPMI3Y:7ld16SwwgZRbaEIo
Malware Config
Extracted
remcos
XIOAMORT
vcvfdjvodsuhvf.con-ip.com:1661
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ALVZO2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GifCamVideoEditor = "C:\\Users\\Admin\\Music\\GifCamUpdater\\GifCamOculus.exe" INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2228 1196 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe 86 PID 1196 wrote to memory of 2228 1196 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe 86 PID 1196 wrote to memory of 2228 1196 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe 86 PID 1196 wrote to memory of 2228 1196 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe 86 PID 1196 wrote to memory of 2228 1196 INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe"C:\Users\Admin\AppData\Local\Temp\INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe"C:\Users\Admin\AppData\Local\Temp\INSPECCIÓN DE MOVIMIENTOS FINANCIEROS.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5976fec1e6e3c1733719a8e12de430048
SHA12c7042ab719700988dd8ea86d99b9a01ca403c09
SHA256e017889e023a2faebd6dbe1564e7c2ae8c29f1a06a351180dcb5b36ee6494527
SHA512b1abdd02ffaea693c193d9cb4ceb172ba79ef354746c854d5af99ba08158a2da28c2d09a47a09c9887ee20a9aa28b8546d82b3e097903badda883a9e23cf4ea8