Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
lib.exe
Resource
win7-20240903-en
General
-
Target
lib.exe
-
Size
1.2MB
-
MD5
b2aa20bc49612dad305b97c79abc54ce
-
SHA1
b010ca5464ca9900348b5f1f5a07165595cee3e3
-
SHA256
11eb819cbd3fdf4c4058d142846e0068f19ac472524cef23565db6eb19422dbe
-
SHA512
de2674f5a350cd0f542ae586169ea0b57433be697fc30b58185422f46685974f25843208244f22813f032d178e1a191d74f5af2374845cb305cdcd012abef70b
-
SSDEEP
24576:yoZAAchGnifgJ+mlr7Q/5h/731IMWj6IhHD5EzLSMkWwz16J:PSAiWlreqrK2dx
Malware Config
Extracted
remcos
2.5.1 Pro
Lamp7
37.252.4.208:9008
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
data.bin
-
keylog_flag
false
-
keylog_folder
Radio
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
1252cbf49-88cd-4b59-a7eb-fc6c523fde-84YHI8
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 21 2752 cmd.exe 23 2752 cmd.exe 24 2752 cmd.exe 25 2752 cmd.exe 26 2752 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\RealtekLan.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2540 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2532 lib.exe 2540 ipconfig.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2540 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2532 wrote to memory of 2540 2532 lib.exe 31 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33 PID 2540 wrote to memory of 2752 2540 ipconfig.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\lib.exe"C:\Users\Admin\AppData\Local\Temp\lib.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5d1ecf2c4163892213bc3bea769781224
SHA1b102d440f9103c1f552371be5276403485020b35
SHA256a4f64b9ee19027c80edccd23767976d0754fe3e519d45ffed80e1750f3c781f2
SHA512dfe341d7f053d4be9d79535dea66a26a1c8b7577492c736147831ddbeadd2b7bab1e82ae0e0f3a7c28eef00611f46e212f43d2c324663fea395e6a64365fac97