Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 6000208225.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RFQ 6000208225.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
RFQ 6000208225.exe
-
Size
1.3MB
-
MD5
3392cd428f177152dcf9ac6256365b1a
-
SHA1
3e454db1c2d909510594a48efbe0380c3194aa2f
-
SHA256
1f785691c057f5062ac9d630cf304ad946c825928c87e63172f335e96beddda1
-
SHA512
53265bead60447f7dd26db363dfe3a698d83c51019c4fa1d51907d5166cd53e11dae4da51ee3ebe162f0313ac6b2971a0a3904a4738fde116d835eab4c4d53bb
-
SSDEEP
24576:Z6k1f9gIpCzUjadgzQdbzyoxSyz74WCePDMoqno2NND74lams:ZJFmSCzyApoy/p3PDP6Ela3
Malware Config
Extracted
remcos
RemoteHost
212.162.149.220:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-2JYO24
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 6 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/2892-56-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1064-55-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2892-49-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2320-44-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/1064-43-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/2320-60-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1064-55-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/1064-43-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/2320-44-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/2320-60-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Loads dropped DLL 2 IoCs
Processes:
RFQ 6000208225.exepid process 1660 RFQ 6000208225.exe 1660 RFQ 6000208225.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
RFQ 6000208225.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RFQ 6000208225.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
RFQ 6000208225.exepid process 4056 RFQ 6000208225.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
RFQ 6000208225.exeRFQ 6000208225.exepid process 1660 RFQ 6000208225.exe 4056 RFQ 6000208225.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RFQ 6000208225.exeRFQ 6000208225.exedescription pid process target process PID 1660 set thread context of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 set thread context of 2320 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 set thread context of 1064 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 set thread context of 2892 4056 RFQ 6000208225.exe RFQ 6000208225.exe -
Drops file in Windows directory 1 IoCs
Processes:
RFQ 6000208225.exedescription ioc process File opened for modification C:\Windows\karga.ini RFQ 6000208225.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RFQ 6000208225.exeRFQ 6000208225.exeRFQ 6000208225.exeRFQ 6000208225.exeRFQ 6000208225.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 6000208225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 6000208225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 6000208225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 6000208225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 6000208225.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RFQ 6000208225.exeRFQ 6000208225.exepid process 2320 RFQ 6000208225.exe 2320 RFQ 6000208225.exe 2892 RFQ 6000208225.exe 2892 RFQ 6000208225.exe 2320 RFQ 6000208225.exe 2320 RFQ 6000208225.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
RFQ 6000208225.exeRFQ 6000208225.exepid process 1660 RFQ 6000208225.exe 4056 RFQ 6000208225.exe 4056 RFQ 6000208225.exe 4056 RFQ 6000208225.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RFQ 6000208225.exedescription pid process Token: SeDebugPrivilege 2892 RFQ 6000208225.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RFQ 6000208225.exepid process 4056 RFQ 6000208225.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
RFQ 6000208225.exeRFQ 6000208225.exedescription pid process target process PID 1660 wrote to memory of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 1660 wrote to memory of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 1660 wrote to memory of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 1660 wrote to memory of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 1660 wrote to memory of 4056 1660 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2320 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2320 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2320 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 1064 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 1064 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 1064 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2892 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2892 4056 RFQ 6000208225.exe RFQ 6000208225.exe PID 4056 wrote to memory of 2892 4056 RFQ 6000208225.exe RFQ 6000208225.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe" /stext "C:\Users\Admin\AppData\Local\Temp\jplstvdkndvcjaflgczklhd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe" /stext "C:\Users\Admin\AppData\Local\Temp\ujyduoodblnhugtppnlmwmxxue"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 6000208225.exe" /stext "C:\Users\Admin\AppData\Local\Temp\wldvughfxtfuwvptgygfzykodsrsib"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD52a90fa08e718cc299198c4b2713eec7f
SHA19aaca117f432881a59aa5672fdb643ff95f27465
SHA256fcf7378a50653ca510828057605b5c01572ccc6a7b7a71beb41c2d372b5c647a
SHA5123868c29def2b1fa5705a7f34a67a5af6e0fb142e61a8593b1958deeddb894b28326049eda17f599e1674774eac181fcd0c587be037196a8ed3bf400eaa2e9174
-
Filesize
4KB
MD5ac300aeaf27709e2067788fdd4624843
SHA1e98edd4615d35de96e30f1a0e13c05b42ee7eb7b
SHA256d2637d58bb120dc6fefe2f38d6e0d4b308006b8639106a7f9e915fa80b5cc9d9
SHA51209c46e708f9d253dccd4d943639d9f8126f868ae3dcd951aad12222bb98b5d3814676f878c8391b9bdab5dedcf5b9e9eaeb2ad3ffec57bda875198735586d4df
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89