Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
981KB
-
MD5
5609198accfb2ccedb39e7755ed6a36c
-
SHA1
2bc0ee0e47c40a298038863338c4c07d7029d695
-
SHA256
06d30761437ffb30ac9ac077bb3761b5e4c077f3b74f8ed3b7372e104dccf83f
-
SHA512
f49ad0d40d40f9073a90cabd73065c4d2ab9de0f340dd109196161ad8bcbd2f73917c5232ec752241231df6ce069e5a0503c844f522a3e7c49daa3ed66a290d3
-
SSDEEP
24576:IAZCJVAeo/UMV0w7KpWXPL8YKSdtJ/JVw6:mPOd8WIYKSdt5
Malware Config
Extracted
remcos
Host
oyo.work.gd:3142
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
pdf
-
mouse_option
false
-
mutex
jkm-I9KENP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
ios
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 4804 set thread context of 3892 4804 file.exe file.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
file.exepid process 3892 file.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exedescription pid process target process PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe PID 4804 wrote to memory of 3892 4804 file.exe file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5ac7f61196ddebbf408b11e5514818a6a
SHA1a5b56989f07b9fe8c46f13c0a19248bc4c25e67c
SHA25685859841e812a18e22bfc2f2711d0f9318beb7a8b64182d6a01a7a14436e0814
SHA51246ab3ddccf112ba56e1eb1d56587611eb6a2cee650c3574dd6ae4b1a6ce8c639c7df60cc3f109eb67b77751c13f1ad354d2613edd8be4cbd31b7e04f43f3d8b2