Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
lib.exe
Resource
win7-20240903-en
General
-
Target
lib.exe
-
Size
1.2MB
-
MD5
b2aa20bc49612dad305b97c79abc54ce
-
SHA1
b010ca5464ca9900348b5f1f5a07165595cee3e3
-
SHA256
11eb819cbd3fdf4c4058d142846e0068f19ac472524cef23565db6eb19422dbe
-
SHA512
de2674f5a350cd0f542ae586169ea0b57433be697fc30b58185422f46685974f25843208244f22813f032d178e1a191d74f5af2374845cb305cdcd012abef70b
-
SSDEEP
24576:yoZAAchGnifgJ+mlr7Q/5h/731IMWj6IhHD5EzLSMkWwz16J:PSAiWlreqrK2dx
Malware Config
Extracted
remcos
2.5.1 Pro
Lamp7
37.252.4.208:9008
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
data.bin
-
keylog_flag
false
-
keylog_folder
Radio
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
1252cbf49-88cd-4b59-a7eb-fc6c523fde-84YHI8
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 50 3128 cmd.exe 59 3128 cmd.exe 64 3128 cmd.exe 75 3128 cmd.exe 76 3128 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\RealtekLan.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3452 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 lib.exe 3452 ipconfig.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3452 ipconfig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3128 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84 PID 1904 wrote to memory of 3452 1904 lib.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\lib.exe"C:\Users\Admin\AppData\Local\Temp\lib.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5c6626af99b51d99784a05f825a00765a
SHA15e3d088686278788c71e582d8a84a183c6011b51
SHA2561f1c70ae136e4e68491851d5389aad3fb525f709179bae6bc3aee08abc65f32c
SHA512350628198759974e2d9b80233344e77f2d139fb50203170e72180ec56beed332ddf46e20dbaa474ceb6b14eff21fd1822cf372e1739247d53785a3731d23b14e