Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe
Resource
win7-20240903-en
General
-
Target
465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe
-
Size
1.9MB
-
MD5
910327e1694532d09255bd8873c2265b
-
SHA1
d8ff879532a00a57eacd8d54cce38653b515d861
-
SHA256
465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0
-
SHA512
680e0dd725dfa2a5ab6ce508567f10a7bf4779c662c0dfb83db4077df83b0b5c132f41cbb3c68efa00077bcaf71ce1ab648301d3da97b406d76ceee9c5bd7d4c
-
SSDEEP
49152:Jswg4gfCUU/mW7Mi8Q1ogJ2U91vwmlRbQhfAu7RPq:ewg4gfc/m9inJy8RbQCu7RP
Malware Config
Extracted
remcos
ms-office
ms-office.duckdns.org:39438
ms-office1.duckdns.org:39439
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-MXJN22
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3884 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3884 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe 3884 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3884 465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe"C:\Users\Admin\AppData\Local\Temp\465b3ea1a625728238b4d832b54b6fdc9321bd638ebd483ebecf2b8e32c322e0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b39b61ede90121f225115b8ca980d76a
SHA18d691dcbfdae1927d14c509635a3b2df5bd49a51
SHA256e5cb44ae3d90c6dc6c0172ee0fe14975d04d2ff62fe4c2b98a16f5e1c191f1dd
SHA512c008aabc2d22511d76ee16d1d6e3035ce6cd2c68972d12dc710c00e077b44c706baa0dd97d7897e6c66c6d29888a9738b04686fe952ce966bdfc5b46350a9900