Analysis
-
max time kernel
180s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
Resource
win10v2004-20241007-en
General
-
Target
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe
-
Size
4.2MB
-
MD5
92d332649b2988f19343cc654634813a
-
SHA1
35633a70e00bb9ddad433276c0d4c85ecd6e3974
-
SHA256
1cb11f58b364c6049d87ce1064472d9e0f6c47455e0b42454cfc9d48c24493dd
-
SHA512
9e59623193253b212af34fa84b69f237d8de84221706ebcab0a6af195c2ec2b7bc4ee4a2f287fdb67e1d51bbbe7ce813cdb1f36d93216ca875b1b5c2081c4e51
-
SSDEEP
49152:LR28UtN5sFpdJE2dNzk6YUiKYCuOpHoG4HLL0ibq59dXuzLvo4wA83W7JSfaTIF6:3o0A2fDl2hOpHoxrYibq9I
Malware Config
Extracted
remcos
DNS
LUNAPETRO.chickenkiller.com:1991
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QPU8J1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HandyBackupEditorDesigner = "C:\\Users\\Admin\\Music\\HandyBackupDesignUpdater\\HandyBackupVideo.exe" COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exeCOMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exepid Process 4080 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exedescription pid Process procid_target PID 1044 wrote to memory of 4080 1044 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 98 PID 1044 wrote to memory of 4080 1044 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 98 PID 1044 wrote to memory of 4080 1044 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 98 PID 1044 wrote to memory of 4080 1044 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 98 PID 1044 wrote to memory of 4080 1044 COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE TRANSFERENCIA PROGRAMADA EXITOSA.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5bcb8a23b5a8a2ef5ee1f4491cce0d658
SHA1930c5e97f56a620827d0a77be82911358911db0c
SHA2569455e0039f2a3ace768ad76a311ecc752762995f5a7c33206560781562f79935
SHA5126b54cda0cf5f8455e455d20aae43ba1493e4b10478576c00677edaff9ba5bfc5a99de99983e36cf20a56621de2b5b0edc630eaa319f31fe51ece3d3c1ba23cee