Malware Analysis Report

2024-12-07 03:32

Sample ID 241113-dk9dxawbjr
Target f49d88f658fe91bfecd7da406e1fb0bf1b2784060077211f0f9ca41b23c5642a.img
SHA256 f49d88f658fe91bfecd7da406e1fb0bf1b2784060077211f0f9ca41b23c5642a
Tags
discovery remcos lonewolf persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f49d88f658fe91bfecd7da406e1fb0bf1b2784060077211f0f9ca41b23c5642a

Threat Level: Known bad

The file f49d88f658fe91bfecd7da406e1fb0bf1b2784060077211f0f9ca41b23c5642a.img was found to be: Known bad.

Malicious Activity Summary

discovery remcos lonewolf persistence rat

Remcos

Remcos family

Loads dropped DLL

Adds Run key to start application

Suspicious use of NtCreateThreadExHideFromDebugger

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Program crash

NSIS installer

Suspicious behavior: MapViewOfSection

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 03:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 03:05

Reported

2024-11-13 03:07

Platform

win7-20240903-en

Max time kernel

117s

Max time network

117s

Command Line

"C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe

"C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 528

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\nsjCA15.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsyCA25.tmp

MD5 5d04a35d3950677049c7a0cf17e37125
SHA1 cafdd49a953864f83d387774b39b2657a253470f
SHA256 a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512 c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 8ce4b16b22b58894aa86c421e8759df3
SHA1 13fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA256 8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA512 2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 50484c19f1afdaf3841a0d821ed393d2
SHA1 c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA256 6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512 d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 67cfa7364c4cf265b047d87ff2e673ae
SHA1 56e27889277981a9b63fcf5b218744a125bbc2fa
SHA256 639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA512 17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nstCA55.tmp

MD5 862d905f91bbda36cef0ce97d96f946e
SHA1 b60689e1c049e070a6f8caaf9618ffc943756608
SHA256 2a2eb56ef14a8d312a968f8c32dc5787efa125085f17219245aed478f1b45a7d
SHA512 32969a23eb49e066a3d6efbff91d2a376929e1af6c1f84c4f65653d16f17401ce1531afc362061b977be1403c3ec9950f2d7763ed1cf387816fb184f0ea18c2f

C:\Users\Admin\AppData\Local\Temp\nstCAA4.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-13 03:05

Reported

2024-11-13 03:07

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe"

Signatures

Remcos

rat remcos

Remcos family

remcos

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Vaskegthed.exe" C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe

"C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe"

C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe

"C:\Users\Admin\AppData\Local\Temp\IMG635673567357735773573757875883587935775753Bjlkeloftet.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 bdias.com udp
BG 91.196.125.125:80 bdias.com tcp
BG 91.196.125.125:443 bdias.com tcp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.23.210.82:80 r10.o.lencr.org tcp
US 8.8.8.8:53 125.125.196.91.in-addr.arpa udp
US 8.8.8.8:53 32.169.19.2.in-addr.arpa udp
US 8.8.8.8:53 82.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 odumegwu.duckdns.org udp
US 192.169.69.26:51525 odumegwu.duckdns.org tcp
US 8.8.8.8:53 odumeje1.duckdns.org udp
US 192.169.69.26:51525 odumeje1.duckdns.org tcp
US 8.8.8.8:53 odumeje.duckdns.org udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 26.69.169.192.in-addr.arpa udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 odumegwu.duckdns.org udp
US 192.169.69.26:51525 odumegwu.duckdns.org tcp
US 8.8.8.8:53 odumeje1.duckdns.org udp
US 192.169.69.26:51525 odumeje1.duckdns.org tcp
US 8.8.8.8:53 odumeje.duckdns.org udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 192.169.69.26:51525 odumeje.duckdns.org tcp
US 8.8.8.8:53 odumegwu.duckdns.org udp
US 192.169.69.26:51525 odumegwu.duckdns.org tcp
US 8.8.8.8:53 odumeje1.duckdns.org udp
US 192.169.69.26:51525 odumeje1.duckdns.org tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 192.169.69.26:51525 tcp

Files

C:\Users\Admin\AppData\Local\Temp\nsc8C91.tmp

MD5 cde63b34c142af0a38cbe83791c964f8
SHA1 ece2b194b486118b40ad12c1f0e9425dd0672424
SHA256 65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d
SHA512 0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

C:\Users\Admin\AppData\Local\Temp\nsc8C91.tmp

MD5 f603843c4b1146c576a2c9e0826de265
SHA1 5de71ba33c20cfb74c19c706a4a44706d78fb102
SHA256 ada9d1ffc0e78d2e2c05290b4ba1b1b04bc9c97a8f8e084ae0d49e36a9bb9c0c
SHA512 7a5a8ebc1c12193783ae711eb4716c1a2e52d1c4799dcd7f2a29924c246b1c665f456de3eaffd5e9cd7f42e788009e2798d1121c8d695698c86349bff17d5e8a

C:\Users\Admin\AppData\Local\Temp\nsx8D5D.tmp\System.dll

MD5 12b140583e3273ee1f65016becea58c4
SHA1 92df24d11797fefd2e1f8d29be9dfd67c56c1ada
SHA256 014f1dfeb842cf7265a3644bc6903c592abe9049bfc7396829172d3d72c4d042
SHA512 49ffdfa1941361430b6acb3555fd3aa05e4120f28cbdf7ceaa2af5937d0b8cccd84471cf63f06f97cf203b4aa20f226bdad082e9421b8e6b62ab6e1e9fc1e68a

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 2b3884fe02299c565e1c37ee7ef99293
SHA1 d8e2ef2a52083f6df210109fea53860ea227af9c
SHA256 ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858
SHA512 aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 7a02f5fcc4fa926f656690c64b909ab6
SHA1 b92430a7da87fac12ae7ba0aea3cc4373a91b2ce
SHA256 4c9cf56a764d54f52d17f4d6a99962dee20b5fe54888357ea9532bb8c54869c9
SHA512 1f95dbfdda145dd50b2c9013fb165cb84eb87879442c30b92106923aaffd755358efb602640f461d81a300a06a905ba38a14eb10fa854105c577c0ce0239e70f

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 288ddaeead52cc6f01034b0ca08e313d
SHA1 849306d8ccc2366251d6dbb07ba2447f800b121e
SHA256 5a3785d2999bdf1992068d247a71a7acc4946c13f17c880635dfa9e48fd2eb2e
SHA512 6101434e23c1bb35be4691de56dca636e4dd713d6ec9f1815b450af666b858b29a96bdae786be376dc312043ab19a3a88789816bf0023e363a703c551645d650

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 a736abcb9380cc3122c530302f713c8b
SHA1 04b4d0d386bd0ade20409730e8160c5c713fb36b
SHA256 5e8f7f2bad61bc10fa2f647e1367a29053166799244128a74508cc3c3a760c08
SHA512 234d99b774a992d86762c9d298dc62d612219234db760a259d6e21ed9d1f10dd810aefb4d9c82af254ceb7d64ff2811772dfc4350ccdfd4375f01a7b801cc333

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 0553e87a8f74189e757bfada8ab0ab9e
SHA1 f4c99fe7e957926b88a46ae93d2f02b855f6d88f
SHA256 2ccb8084cb357c920cad749dcb3a4c25339f530c9947dfc8e1f1d54cb7b0ce24
SHA512 8df3168e8f53b40ddf4b2e83d4e3cad2c88edfb484292e263ee5264d7992af6f1aa8a3618f5e90a02082a3642a894bfae43853b35abaef833a8aa5b590fc70fc

C:\Users\Admin\AppData\Local\Temp\nsn8D6E.tmp

MD5 5d04a35d3950677049c7a0cf17e37125
SHA1 cafdd49a953864f83d387774b39b2657a253470f
SHA256 a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512 c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

C:\Users\Admin\AppData\Local\Temp\nsd8E1B.tmp

MD5 4e27f2226785e9abbe046fc592668860
SHA1 28b18a7f383131df509f7191f946a32c5a2e410c
SHA256 01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA512 2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

C:\Users\Admin\AppData\Local\Temp\nsd8E1B.tmp

MD5 c3cb69218b85c3260387fb582cb518dd
SHA1 961c892ded09a4cbb5392097bb845ccba65902ad
SHA256 1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA512 2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

C:\Users\Admin\AppData\Local\Temp\nsd8E1B.tmp

MD5 1a976b081f77c04dad951286222ed3da
SHA1 1fd2c47eab6b8b5ee42fee2f8238bd065881d99d
SHA256 d7c42493656ae25d5a3ff0b7fa739e43557d2c54a82833c8782ddbe8d364816d
SHA512 e087d4f397761e3525241f2610f8be1bd46533905fc0bf39435127e1341c1f4c21fc1d2f1b213d78b0505d8bafbc4f797b85537601a0f186850457d3d2847a23

C:\Users\Admin\AppData\Local\Temp\nsd8E1B.tmp

MD5 e51a9c4f8f3b5431166acefd3646280b
SHA1 dcd34eb4c0be672279584de942e58d538cb71c6b
SHA256 922ec291c6ccf28b28fb9ad53b5dc81cda5b3267f9d549a92b5e361fc20c836b
SHA512 acc6cf29e5c64c65f95f452703c5275b2b90b8ef64550974fb5a3f785827981af56a1d62185c3c95a1c720999f91a256e467c31fe9210a0273d0cd3edf7901e1

C:\Users\Admin\AppData\Local\Temp\nsd8E1B.tmp

MD5 abb2f7c68835cdb13006e9e0e7d54058
SHA1 9480e2137e9996487a45b404068f6ae2784b4f4d
SHA256 c3cf7acb57249ce4c44692992a99b855eba966e31dd9397f454d21f43007cf9d
SHA512 d1555999f006d6e38633ca5dfa6100be27186bbfadc70c5adcc1d566c5c8ab7bff28014c885e3c34351f614fc6f5e5d90f16d2e1662dba9076857e44ef4a3c4d

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 25bc6654798eb508fa0b6343212a74fe
SHA1 15d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA256 8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA512 5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 e2fecc970546c3418917879fe354826c
SHA1 63f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256 ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA512 3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 9a53fc1d7126c5e7c81bb5c15b15537b
SHA1 e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256 a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512 b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 c04a4393a2a9ddb4574d18bfc2b03c0c
SHA1 e7ad5bf9b961812cd6f09ac79890c89564f3b2a9
SHA256 68eacedba0d80aadd35854d1d4303272f4d72128897260e40459e1db8701d497
SHA512 ef554ab568be80d8f84f5e1a50490b89d8dc3cbbe8daa34459c8a4f83145f5e05db371090ac11056d7f6e2facc4547995de9a153db0c7090e653fdfcfe994136

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 5e029610dbed28a50700d8efc65b150f
SHA1 4f736d6d71a94654867d0d122a58b29c61e71d0d
SHA256 e95514f1af92029ebd089867b3cfad95d3cc50196b4dd9ee86c4ac3385321c60
SHA512 5a344c2f576f03eaa14577d385f344b3048cf3802b0885db0fe6ad62da669703b8bd8e3a9c415e81dc3df374d129281cd1131c6c4c5933b2d5a2c69b11e479ed

C:\Users\Admin\AppData\Local\Temp\nsy8EE7.tmp

MD5 6607df7a23c2b55aea2033cfdfbee33b
SHA1 0e395eea09a0d22cd3d31094512965e1b4526cca
SHA256 ac954efbe3da00e6837bca7036246a99b8d45d03ce40b93f38687f374540264e
SHA512 0d27f7bbb3881675971d7bf39d69e62b3d8ff41983cbefbcf9eb93f37125c0c675e464d048b0291b6e6e26f35e529520051397701d599d96ac9f2cc383401fd9

C:\Users\Admin\AppData\Local\Temp\nse8FF2.tmp

MD5 494d0d159b1e574f09fe79bda72f9c7c
SHA1 257a74558f794976d51b62a2af3b8e8e0bf8d999
SHA256 aafe3e506b4a9cdc77a876716f2ca016314e4529646d588cd6ee1b8573bbcd28
SHA512 93adc30e04f5d3f5f6e0372c77d20c148322717d53ca923145d2428ee960158eafed406e9af4996ce969c69b5b690c1758a3857891fb74e27c2f1685aa4ba0a6

C:\Users\Admin\AppData\Local\Temp\nse8FF2.tmp

MD5 f15bfdebb2df02d02c8491bde1b4e9bd
SHA1 93bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256 c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA512 1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

memory/2936-565-0x0000000077C61000-0x0000000077D81000-memory.dmp

memory/2936-566-0x0000000077C61000-0x0000000077D81000-memory.dmp

memory/2936-567-0x0000000074AC5000-0x0000000074AC6000-memory.dmp

memory/3388-568-0x0000000077CE8000-0x0000000077CE9000-memory.dmp

memory/3388-569-0x0000000077C61000-0x0000000077D81000-memory.dmp

memory/3388-574-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-578-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-582-0x0000000077C61000-0x0000000077D81000-memory.dmp

memory/3388-583-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-584-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-585-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-586-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-587-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-588-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-589-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-591-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-592-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-593-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-594-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-595-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-596-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-597-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-598-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-600-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-601-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-602-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-603-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-604-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-605-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-607-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-608-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-609-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-610-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-611-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-612-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-613-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-614-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-615-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-616-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-617-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-618-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-619-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-620-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-622-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-621-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-623-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-625-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-627-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-629-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-630-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-631-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-632-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-633-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-634-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-635-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-638-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-639-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-640-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-641-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-642-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-643-0x0000000000460000-0x00000000016B4000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 5d43f4a52ed8bb32c251129c412bf191
SHA1 2112ab2c98fddb4952c4feba1e2a1194ebde7c68
SHA256 b9c8a9a93240602da84947ba83d332a65fb20f0f5f39ca8973c645bdc1e4ef30
SHA512 b2a31fb6f59fa11313a4425394b901380565ad9871756c6cef0cbfa9f171b62f45ddfa7287b15fa743ba72f150b25d31a5b323bfff2786953f86c803f7b1d5b5

memory/3388-645-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-646-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-649-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-650-0x0000000000493000-0x0000000000494000-memory.dmp

memory/3388-652-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-653-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-654-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-656-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-657-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-658-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-659-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-660-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-661-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-662-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-663-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-664-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-665-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-666-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-667-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-668-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-669-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-671-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-672-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-674-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-676-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-677-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-678-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-679-0x0000000000460000-0x00000000016B4000-memory.dmp

memory/3388-680-0x0000000000460000-0x00000000016B4000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-13 03:05

Reported

2024-11-13 03:07

Platform

win7-20241010-en

Max time kernel

118s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 220

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-13 03:05

Reported

2024-11-13 03:07

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

138s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5028 wrote to memory of 2796 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 5028 wrote to memory of 2796 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 5028 wrote to memory of 2796 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2796 -ip 2796

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 616

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp

Files

N/A