Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe
Resource
win7-20240903-en
General
-
Target
2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe
-
Size
434KB
-
MD5
ce267a996c44494d89d5aec44995565f
-
SHA1
4612608b2606981f2f211b375f29de9bfa7c6224
-
SHA256
93ea3517074ca0035d61c7136633189520bbfd4a3d22ab571fbb3d09c2422bad
-
SHA512
cffdccae97e34dd410f816a595417246de72be577e31833f94f3649301785d38b291c98399978ccba7a3f89c116b7d8afc20794384889fafc2772674c0507b1b
-
SSDEEP
6144:dIKXgnfQ5/BZmrLzoYM4TOzTCdJOcG7Q/+hGZz4tXNp78d+kBTObbiFkeVny:KKwnoVK3oYM4eToG7Q/+hGZcSAiFkeV
Malware Config
Extracted
remcos
1.7 Pro
Wizard
severdops.ddns.net:8117
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
logz
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_lphprnenws
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
wire
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2752 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 31 PID 2168 wrote to memory of 2752 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 31 PID 2168 wrote to memory of 2752 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 31 PID 2168 wrote to memory of 2752 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 31 PID 2168 wrote to memory of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 PID 2168 wrote to memory of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 PID 2168 wrote to memory of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 PID 2168 wrote to memory of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 PID 2168 wrote to memory of 2808 2168 2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe 32 PID 2752 wrote to memory of 2884 2752 cmd.exe 34 PID 2752 wrote to memory of 2884 2752 cmd.exe 34 PID 2752 wrote to memory of 2884 2752 cmd.exe 34 PID 2752 wrote to memory of 2884 2752 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN adobes /XML "C:\Users\Admin\AppData\Local\Temp\790afd102b7e4efdb004e3591c8a3bfc.xml"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN adobes /XML "C:\Users\Admin\AppData\Local\Temp\790afd102b7e4efdb004e3591c8a3bfc.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_ce267a996c44494d89d5aec44995565f_mafia.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d94a58a5d9a39849273dafe349bd6af7
SHA1cb01aa2365471888decce36d1cf1fc3a1057e070
SHA256f8a258f2f9548f60db72324e734c0fe7009ff357409772612687065a47c2d255
SHA51250b2757226be479b6a195a85eed33bb4ff053eebef498c7580c53997394a211416e19c2999de98ec31dcc47b81d7fdea82ccf482f6029117c4dc6984a9f2c997