Overview
overview
10Static
static
10027f61e886...f6.exe
windows7-x64
10027f61e886...f6.exe
windows10-2004-x64
101bd73cc068...20.exe
windows7-x64
101bd73cc068...20.exe
windows10-2004-x64
10499a3eb429...30.exe
windows7-x64
10499a3eb429...30.exe
windows10-2004-x64
1050509dce2f...a5.exe
windows7-x64
1050509dce2f...a5.exe
windows10-2004-x64
108e2e5cfb4d...0b.exe
windows7-x64
108e2e5cfb4d...0b.exe
windows10-2004-x64
1091d6dddfa6...3a.exe
windows7-x64
791d6dddfa6...3a.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3cac980acc3...ac.exe
windows7-x64
7cac980acc3...ac.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3d33cc2d538...4c.exe
windows7-x64
7d33cc2d538...4c.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 19:42
Behavioral task
behavioral1
Sample
027f61e8861f743bf8e8cb0ca2ea5de056790cffed76d375e5e84f6575bc7ff6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
027f61e8861f743bf8e8cb0ca2ea5de056790cffed76d375e5e84f6575bc7ff6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1bd73cc068f858e99861b797860bc4aeeb5b339ad92dcbc17d934d090f06d520.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1bd73cc068f858e99861b797860bc4aeeb5b339ad92dcbc17d934d090f06d520.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
499a3eb429ceb358c7a3433fb11bee99f32f0c443444eb0001e405da42c75c30.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
499a3eb429ceb358c7a3433fb11bee99f32f0c443444eb0001e405da42c75c30.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
50509dce2f200a500fad2972b0a230aee615d266e5c2580a2fd827def2bc06a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
50509dce2f200a500fad2972b0a230aee615d266e5c2580a2fd827def2bc06a5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
91d6dddfa68f96245158774050287c2ffbf2510e198d27a770075f8e7663113a.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
91d6dddfa68f96245158774050287c2ffbf2510e198d27a770075f8e7663113a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/WndSubclass.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/WndSubclass.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c.exe
Resource
win10v2004-20241007-en
General
-
Target
8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe
-
Size
459KB
-
MD5
033b66b0c1a4f974258641e792de5dfc
-
SHA1
20f08d93900e5444d3d224a67680090445847a57
-
SHA256
8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b
-
SHA512
f5914c06f3c3ebdd1455fd09cebdc9b09a78b39f4bfbbe333e219b973abd6ac52076638ef701354dec7a3da75dceedf174759c1d63cb9aa21734d833d90cdc2d
-
SSDEEP
6144:aa4YiP1U/VOKRUz7mxE3oEhxv2gYnCLrbLM9iHul+jZ5mv9Qoj8lAOZZlvXI2FEF:aa4RU/U3AVE2gNrY9iH8+1YMfZlAjeG
Malware Config
Extracted
remcos
3.3.0 Pro
RemoteHost
178.20.44.131:2406
new.bingoroll20.net:2406
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
winerar.exe
-
copy_folder
Winerar
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
pidronic-2CGLP3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winerar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" winerar.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4092 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4472 winerar.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" winerar.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Winerar\\winerar.exe\"" winerar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winerar.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2316 wrote to memory of 4092 2316 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe 88 PID 2316 wrote to memory of 4092 2316 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe 88 PID 2316 wrote to memory of 4092 2316 8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe 88 PID 4092 wrote to memory of 916 4092 WScript.exe 90 PID 4092 wrote to memory of 916 4092 WScript.exe 90 PID 4092 wrote to memory of 916 4092 WScript.exe 90 PID 916 wrote to memory of 4472 916 cmd.exe 92 PID 916 wrote to memory of 4472 916 cmd.exe 92 PID 916 wrote to memory of 4472 916 cmd.exe 92 PID 4472 wrote to memory of 2520 4472 winerar.exe 93 PID 4472 wrote to memory of 2520 4472 winerar.exe 93 PID 4472 wrote to memory of 1448 4472 winerar.exe 94 PID 4472 wrote to memory of 1448 4472 winerar.exe 94 PID 4472 wrote to memory of 1448 4472 winerar.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe"C:\Users\Admin\AppData\Local\Temp\8e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Winerar\winerar.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Roaming\Winerar\winerar.exeC:\Users\Admin\AppData\Roaming\Winerar\winerar.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\program files\internet explorer\iexplore.exe"c:\program files\internet explorer\iexplore.exe"5⤵PID:2520
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:1448
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662B
MD5b8a59bdc535f5405f01d7831d4fb86b6
SHA15911d0a60f70cecb8a158f484c69003ac31f0b20
SHA256ad80d14909d72397edd93dd9305d3aa3591972210b2b0a314fa48a6fbde160ee
SHA51231b5219507807d72899d1424ec68d7a65bb44ab4bcb1d1562c966ad9bde9df1d3615c2c315f0c56f06a404be8b5c1de0a4c97e28c100f04334c07ba74d7088a5
-
Filesize
459KB
MD5033b66b0c1a4f974258641e792de5dfc
SHA120f08d93900e5444d3d224a67680090445847a57
SHA2568e2e5cfb4dc796e89cc792fbae884061b87c18494afa7dec02c92e5d46bd990b
SHA512f5914c06f3c3ebdd1455fd09cebdc9b09a78b39f4bfbbe333e219b973abd6ac52076638ef701354dec7a3da75dceedf174759c1d63cb9aa21734d833d90cdc2d