Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
981KB
-
MD5
5609198accfb2ccedb39e7755ed6a36c
-
SHA1
2bc0ee0e47c40a298038863338c4c07d7029d695
-
SHA256
06d30761437ffb30ac9ac077bb3761b5e4c077f3b74f8ed3b7372e104dccf83f
-
SHA512
f49ad0d40d40f9073a90cabd73065c4d2ab9de0f340dd109196161ad8bcbd2f73917c5232ec752241231df6ce069e5a0503c844f522a3e7c49daa3ed66a290d3
-
SSDEEP
24576:IAZCJVAeo/UMV0w7KpWXPL8YKSdtJ/JVw6:mPOd8WIYKSdt5
Malware Config
Extracted
remcos
Host
oyo.work.gd:3142
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
pdf
-
mouse_option
false
-
mutex
jkm-I9KENP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ios
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2876 set thread context of 2724 2876 file.exe file.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
file.exepid process 2724 file.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
file.exedescription pid process target process PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe PID 2876 wrote to memory of 2724 2876 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD591c9ee7762cb2a573f9c50b437fc9ead
SHA17da4b61f4abed46256d37b91f6ddd50bcf90403d
SHA256d55e5330a4b477d8806dd317d2755ee79da4b18af51dbdefff11fcf4110a84cf
SHA5126cd161a3eb66dfa5ccacd9ada8518dc29267de9fea4865cbbcac7e4f61e4839ec78ae45ab3b48f55e83be547581d9d87a73cb5038cf721714ff9cd8d80431d2a