Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
Quote.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Quote.exe
Resource
win10v2004-20241007-en
General
-
Target
Quote.exe
-
Size
1.6MB
-
MD5
73da95db4e2d451af39f2e3d0d102836
-
SHA1
9d387a0f9f90686439406f1cc96a0eb3511a88b4
-
SHA256
f8e8e8ee70d44b81dcb14b4e94163846c315c2d45ecb5a3888fd6db8a2e20714
-
SHA512
a83f9aad5aa9b853b3674d628de1aab7d714191627c64779243954e5643c1f1565fdf4943e4ed3bed1f85046cf1b8eb86c3d0e5db3d4e81397db24f8076a7f57
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLYXROlErRU3BobqTxRLGutJ3lzpHax8CS1/rW+9tMeOW0SYoq:f3v+7/5QLYkuYoGTxp6xe/rWuM89I
Malware Config
Extracted
remcos
RemoteHost
www.projectusf.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
gfh
-
mouse_option
false
-
mutex
Rmc-J91LMC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Quote.vbs Quote.exe -
Executes dropped EXE 1 IoCs
pid Process 348 Quote.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c8a-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 348 set thread context of 4244 348 Quote.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 348 Quote.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 636 wrote to memory of 348 636 Quote.exe 86 PID 636 wrote to memory of 348 636 Quote.exe 86 PID 636 wrote to memory of 348 636 Quote.exe 86 PID 348 wrote to memory of 4244 348 Quote.exe 87 PID 348 wrote to memory of 4244 348 Quote.exe 87 PID 348 wrote to memory of 4244 348 Quote.exe 87 PID 348 wrote to memory of 4244 348 Quote.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote.exe"C:\Users\Admin\AppData\Local\Temp\Quote.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\directory\Quote.exe"C:\Users\Admin\AppData\Local\Temp\Quote.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Quote.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5976abb8e52bd5774f289da533d859ee6
SHA14e22159022927a60f9990421e1c545750569a583
SHA256c2ef10e461e9b2219ca130b1221d0769b3deae3f81c7998fee600c9992a9a375
SHA512cc93cfb6f8ecccbb51869fae14e587042d30d2b7ef5e9fa6f48b243e3d4669715f4df8fe9d3b0a1e7c00c372c03e2c3c55e1bf848b925034fed553101c8ba4ee
-
Filesize
1.6MB
MD573da95db4e2d451af39f2e3d0d102836
SHA19d387a0f9f90686439406f1cc96a0eb3511a88b4
SHA256f8e8e8ee70d44b81dcb14b4e94163846c315c2d45ecb5a3888fd6db8a2e20714
SHA512a83f9aad5aa9b853b3674d628de1aab7d714191627c64779243954e5643c1f1565fdf4943e4ed3bed1f85046cf1b8eb86c3d0e5db3d4e81397db24f8076a7f57