Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe
Resource
win7-20240903-en
General
-
Target
ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe
-
Size
6.1MB
-
MD5
2cede2aef03d4436cac510971c604d10
-
SHA1
1454f28eaf7deb3b33bc9e4beed261f935c2451a
-
SHA256
ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59
-
SHA512
808d06c5a7b78ff8ea90ecbb4bfa8f3e1bce0b697736b877860e805521668020af51a479547db7b88f5acb6d5fde43b1579b539ef705a9bfa7d9b7a1d32de91c
-
SSDEEP
196608:N8QTH4OwL4MBQqus0YkuwYMfiUB5NdBD8R3ZZOR:N80H4OwLZBPus0YkuwYMfiUB5NvD03Z6
Malware Config
Extracted
remcos
BLANCO
camino9938.strangled.net:3018
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
data
-
mouse_option
false
-
mutex
nhfkkasivbijkewflivlikewf-LIQNJX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31 PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31 PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31 PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31 PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31 PID 2352 wrote to memory of 2948 2352 ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe"C:\Users\Admin\AppData\Local\Temp\ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe"C:\Users\Admin\AppData\Local\Temp\ac93bb754026e02ece7eb0ac015605b6b7e9e6fa1526def22a4bb3e34569ec59N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD55af8055b8226118ad7bee9137015f994
SHA182adeb0a711121fa27e95787c8416c2b40276479
SHA2560bc7472ba27e46c92f58f99594316054db9f858db979c87434f5d9c97e398f41
SHA512f4480d0cf8d640596cfc84953ca21217b2d284b7465ad91e62edaf0dfc0464ff39f0a17b85a2c6b29f66ee3c042abfdbf988f10b572ce0f6880e08a477016ff8