Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0.dll
Resource
win10v2004-20241007-en
General
-
Target
8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0.dll
-
Size
15.1MB
-
MD5
6d5a39ffb948ce7ff8744e302201f711
-
SHA1
af806feeb69690f4963eaa146c1debb67a45895d
-
SHA256
8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0
-
SHA512
bc2869463865c220800279cd4973633daeda05484fcf172ac4c5750eb7e215b88dffa195e51aafdf4193a5f5d182859966d70d1e1fcd3b6bd6a3f5d0663f0b00
-
SSDEEP
196608:i0ivGTAslgbSYBsnBho/wnBvq+4rMOblxz6qYFS1qY2aubxi58/EUxFFVsmN:izvfaEog+4rdbUTFVRN
Malware Config
Extracted
remcos
zuma
goatratedman.com:4050
extendedbreakfast.com:5140
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
bghtyi-ILS8CA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*Chrome = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\VIVA_01.dll,EntryPoint" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 3084 4744 regsvr32.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4744 4748 regsvr32.exe 84 PID 4748 wrote to memory of 4744 4748 regsvr32.exe 84 PID 4748 wrote to memory of 4744 4748 regsvr32.exe 84 PID 4744 wrote to memory of 3180 4744 regsvr32.exe 96 PID 4744 wrote to memory of 3180 4744 regsvr32.exe 96 PID 4744 wrote to memory of 3180 4744 regsvr32.exe 96 PID 4744 wrote to memory of 3084 4744 regsvr32.exe 97 PID 4744 wrote to memory of 3084 4744 regsvr32.exe 97 PID 4744 wrote to memory of 3084 4744 regsvr32.exe 97 PID 4744 wrote to memory of 3084 4744 regsvr32.exe 97 PID 4744 wrote to memory of 3084 4744 regsvr32.exe 97 PID 3180 wrote to memory of 3168 3180 cmd.exe 100 PID 3180 wrote to memory of 3168 3180 cmd.exe 100 PID 3180 wrote to memory of 3168 3180 cmd.exe 100
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8e521953f01b56f163a5d7ca777cdbef86f1d9291bf994d3ba35cb0e89729da0.dll2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*Chrome" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\VIVA_01.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*Chrome" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\VIVA_01.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3168
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-