Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe
Resource
win7-20240903-en
General
-
Target
935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe
-
Size
944KB
-
MD5
b8d56a76c20f7112dad67dcf0ed7db76
-
SHA1
de67506c08d6fef79fff815e27cda68403980fc9
-
SHA256
935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea
-
SHA512
8211cd38a129df696ce6b5909990095c1762db549ca6c3781027c9394bb835812401237c669cdb72acb9941cf068fea1935719817bbe752a5a7df772293075ec
-
SSDEEP
12288:snC0mUwAF27PpvOvGrAl+5tbmzaCKqk0eua+ANHNAtFDQEa5g3M5JQCjXPpXylhd:KmUXFYpRrZ55jCKq/etMeDgc5PjN6cE
Malware Config
Extracted
remcos
mekus
dpm-sael.com:2017
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
meckus-ODY51K
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2800 powershell.exe 2756 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 2756 powershell.exe 2800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2800 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2800 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 31 PID 2056 wrote to memory of 2800 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 31 PID 2056 wrote to memory of 2800 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 31 PID 2056 wrote to memory of 2800 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 31 PID 2056 wrote to memory of 2756 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 33 PID 2056 wrote to memory of 2756 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 33 PID 2056 wrote to memory of 2756 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 33 PID 2056 wrote to memory of 2756 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 33 PID 2056 wrote to memory of 2208 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 34 PID 2056 wrote to memory of 2208 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 34 PID 2056 wrote to memory of 2208 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 34 PID 2056 wrote to memory of 2208 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 34 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37 PID 2056 wrote to memory of 2644 2056 935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe"C:\Users\Admin\AppData\Local\Temp\935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RhFlTiIjgELLJp.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RhFlTiIjgELLJp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1D5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe"C:\Users\Admin\AppData\Local\Temp\935a99d2fbb4053dadbfe9da227f4019d0807785bb193e56e719b7583f49b1ea.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5dc7d3b93caa8f9422aadd3a79bce7e3b
SHA18371bb6bd979b45e0ae656483e355a283ff89627
SHA2567f3724dfee797c3f9e4d521ff05c628bf6a6d4c834c17c59d626528cbd8f6adc
SHA512107440d8ca610927561cb21ad065a639f28958a6e44d5eaec8fd124fe3940c58aa93511507ea74a71f7de0e2b104409dab9ee534ab108bc4dfdd4657d127da40
-
Filesize
1KB
MD5c5612139f5f8acaceae6979a22484b8f
SHA157242c019a41201dff11ec91b7203edd99aa2863
SHA2561320e456537e1eee8c9c1f555da87c06499077e8d8f11d96b1db2dd9ac7c3b06
SHA512b8223625dc9259fdfc069d1230c6efd98ff22858421a151c6bd5c59fc6c2bcd908105cf6332f6d0046365748aa7292b4375b0691e6725a4f94b4ad6e33fac4b8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6A4XUMT95SMZLXT1FL86.temp
Filesize7KB
MD5b0f2d85b98070ffc9748b48e65c74d25
SHA117b8ef246e6cce22bbb26dc80d6362f4ee0ba586
SHA25673ef69e4baea570625e8db87a4a060ae0514f659775db688e5c9515e4f0f12dd
SHA5128c40fbb6355d1f8320840732dcef2db0b15d31b93ff664f66418c0e03d98fe46f7ce28e498056e3ca08439d3362d2b523d0582a36642f73de2563986cf47f862