Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
981KB
-
MD5
5609198accfb2ccedb39e7755ed6a36c
-
SHA1
2bc0ee0e47c40a298038863338c4c07d7029d695
-
SHA256
06d30761437ffb30ac9ac077bb3761b5e4c077f3b74f8ed3b7372e104dccf83f
-
SHA512
f49ad0d40d40f9073a90cabd73065c4d2ab9de0f340dd109196161ad8bcbd2f73917c5232ec752241231df6ce069e5a0503c844f522a3e7c49daa3ed66a290d3
-
SSDEEP
24576:IAZCJVAeo/UMV0w7KpWXPL8YKSdtJ/JVw6:mPOd8WIYKSdt5
Malware Config
Extracted
remcos
Host
oyo.work.gd:3142
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
pdf
-
mouse_option
false
-
mutex
jkm-I9KENP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ios
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2748 set thread context of 2796 2748 file.exe file.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
file.exepid process 2796 file.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
file.exedescription pid process target process PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe PID 2748 wrote to memory of 2796 2748 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e5e7fd809c78bac15be0f031c70c2ba3
SHA10c20eac4de43c144c9ce1e55ff5dab3e016029bc
SHA256b4b7ad290747576f382e62ea8b23bffcc1df678f9ae7ba906394e5dde38f527b
SHA512380e88326b1ca87e9a01a0ec2b8ac258a7bc3f4acd039d4ac6579a7b79e68ee2e7c32636122649ae329ae914adacadf31f866238652b4fa59dc24e43644d857d