Analysis
-
max time kernel
177s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
Resource
win10v2004-20241007-en
General
-
Target
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
-
Size
4.2MB
-
MD5
92d332649b2988f19343cc654634813a
-
SHA1
35633a70e00bb9ddad433276c0d4c85ecd6e3974
-
SHA256
1cb11f58b364c6049d87ce1064472d9e0f6c47455e0b42454cfc9d48c24493dd
-
SHA512
9e59623193253b212af34fa84b69f237d8de84221706ebcab0a6af195c2ec2b7bc4ee4a2f287fdb67e1d51bbbe7ce813cdb1f36d93216ca875b1b5c2081c4e51
-
SSDEEP
49152:LR28UtN5sFpdJE2dNzk6YUiKYCuOpHoG4HLL0ibq59dXuzLvo4wA83W7JSfaTIF6:3o0A2fDl2hOpHoxrYibq9I
Malware Config
Extracted
remcos
DNS
LUNAPETRO.chickenkiller.com:1991
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QPU8J1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HandyBackupEditorDesigner = "C:\\Users\\Admin\\Music\\HandyBackupDesignUpdater\\HandyBackupVideo.exe" COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exeCOMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exepid Process 2916 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription pid Process procid_target PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31 PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31 PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31 PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31 PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31 PID 2112 wrote to memory of 2916 2112 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e59bc42f39f78ecee390ec148a7093af
SHA15e234df84a2c929a1b9e3368dd355936302ae3e6
SHA2568e95946efe1fbbecb9b651b793ad440e321ac6929c13bc2eb9d4e8a6974ff1ee
SHA512f94219c2a579eb17e34b63065f465ed9781ce28ccf2faa7b74c6bf0e6a8c699ee9012a58788ad17638a9bc3c15b1a99f6b87599e20a6b8bcb522a8aebe29332f