Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
l2StCMee3nFFvI3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
l2StCMee3nFFvI3.exe
Resource
win10v2004-20241007-en
General
-
Target
l2StCMee3nFFvI3.exe
-
Size
1.1MB
-
MD5
a290d7cec1d2cd6544fa0e315d5e518e
-
SHA1
e122b7be973e6b69862ff1cca3f4870655e97e02
-
SHA256
db404ec3f27d0e9173f55db560ff6777560226f3a52bfde901897f637a24d89b
-
SHA512
583696f95ef1a827b5e540bf12343912c00cd2fae6135aace6800a601878644bf419303bac0a45d796e3d4655708f4d273637ff8492704a9866d75ce88c17d6e
-
SSDEEP
24576:/q0qwHvmNKfrhP6W6qh+AasOkie2QBudJ9WamSL:/qqmYfrQWdh3CkvXYdJ9o
Malware Config
Extracted
remcos
RemoteHost
192.3.220.30:8080
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-SF7E52
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 4548 4604 l2StCMee3nFFvI3.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2StCMee3nFFvI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2StCMee3nFFvI3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4604 l2StCMee3nFFvI3.exe 4604 l2StCMee3nFFvI3.exe 4604 l2StCMee3nFFvI3.exe 4604 l2StCMee3nFFvI3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4604 l2StCMee3nFFvI3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1128 4604 l2StCMee3nFFvI3.exe 99 PID 4604 wrote to memory of 1128 4604 l2StCMee3nFFvI3.exe 99 PID 4604 wrote to memory of 1128 4604 l2StCMee3nFFvI3.exe 99 PID 4604 wrote to memory of 924 4604 l2StCMee3nFFvI3.exe 100 PID 4604 wrote to memory of 924 4604 l2StCMee3nFFvI3.exe 100 PID 4604 wrote to memory of 924 4604 l2StCMee3nFFvI3.exe 100 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101 PID 4604 wrote to memory of 4548 4604 l2StCMee3nFFvI3.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"2⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"2⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"C:\Users\Admin\AppData\Local\Temp\l2StCMee3nFFvI3.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4548
-