Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe
Resource
win7-20240708-en
General
-
Target
6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe
-
Size
434KB
-
MD5
8c36c705de3dda6d458b4841ca397903
-
SHA1
d28cf32cc3324b0d5ade0649bca2dfae1850de73
-
SHA256
6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856
-
SHA512
a8ef1b4d44ad83ac22815b141792b86dfecfff947095de0f01a7a658eadccf30c753b099ae9a9e641b4e6f32e498441e86f57bee171d17f0b75ad16d1ec8f149
-
SSDEEP
6144:dIKXgnfQ5/BZmrLzoYM4TOzTCdJOcG7Q/+hGZz4tXNp78d+kBTObbiFkeVny:KKwnoVK3oYM4eToG7Q/+hGZcSAiFkeV
Malware Config
Extracted
remcos
1.7 Pro
Wizard
severdops.ddns.net:8117
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
logz
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lphprnenws
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
wire
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3928 set thread context of 4892 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4408 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4892 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4892 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4212 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 95 PID 3928 wrote to memory of 4212 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 95 PID 3928 wrote to memory of 4212 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 95 PID 3928 wrote to memory of 4892 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 96 PID 3928 wrote to memory of 4892 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 96 PID 3928 wrote to memory of 4892 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 96 PID 3928 wrote to memory of 4892 3928 6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe 96 PID 4212 wrote to memory of 4408 4212 cmd.exe 98 PID 4212 wrote to memory of 4408 4212 cmd.exe 98 PID 4212 wrote to memory of 4408 4212 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe"C:\Users\Admin\AppData\Local\Temp\6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN adobes /XML "C:\Users\Admin\AppData\Local\Temp\790afd102b7e4efdb004e3591c8a3bfc.xml"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN adobes /XML "C:\Users\Admin\AppData\Local\Temp\790afd102b7e4efdb004e3591c8a3bfc.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4408
-
-
-
C:\Users\Admin\AppData\Local\Temp\6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe"C:\Users\Admin\AppData\Local\Temp\6f01db7f152dd37280408250e039eac0afca1499de02ff37a1f1eb1c48de8856.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51c3f94e79317aaca74a33cddc1c6817e
SHA1299fceadb4cb4db2563a2f93f71d3bffe1b69a32
SHA25641cf96aa4ffcb99dff8e57ddc7ad85df3826a12eec3d063620ddd3d9e92b9c16
SHA512e3d24cdff2e54f27a819fc089d845a0354db18dc2ea06dfeef7a4a44280081dfb7e5422cad0382e6eeb16d850eb19233b3ec4bc5ad006c8e7aa3dea0e1ddc567