Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe
Resource
win7-20241023-en
General
-
Target
0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe
-
Size
1.0MB
-
MD5
fc8e03a9454af696d8825eb6bbe82f90
-
SHA1
fbdaba556ea8fa0a902667d42347ff078279f36f
-
SHA256
0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134
-
SHA512
72b6c3d00b75d597f3291f07dd7b1f698b8b284f5a09084e6f5db759a8fb9b88932318bbcaa2381cbc5ab7b1def9dc0316b504c09db52955a022373689d21ce4
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCDH1MJ55AxaiKDeLRr:7JZoQrbTFZY1iaCLQ56aifh
Malware Config
Extracted
remcos
OCT 28
myhost001.myddns.me:9373
103.161.133.98:4804
103.161.133.98:9373
myhost001.myddns.me:4804
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-47R6I4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
Processes:
turbinals.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\turbinals.vbs turbinals.exe -
Executes dropped EXE 2 IoCs
Processes:
turbinals.exeturbinals.exepid process 116 turbinals.exe 1568 turbinals.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
turbinals.exedescription pid process target process PID 1568 set thread context of 3680 1568 turbinals.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exeturbinals.exeturbinals.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
turbinals.exeturbinals.exepid process 116 turbinals.exe 1568 turbinals.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 3680 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exeturbinals.exeturbinals.exedescription pid process target process PID 1924 wrote to memory of 116 1924 0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe turbinals.exe PID 1924 wrote to memory of 116 1924 0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe turbinals.exe PID 1924 wrote to memory of 116 1924 0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe turbinals.exe PID 116 wrote to memory of 3664 116 turbinals.exe svchost.exe PID 116 wrote to memory of 3664 116 turbinals.exe svchost.exe PID 116 wrote to memory of 3664 116 turbinals.exe svchost.exe PID 116 wrote to memory of 1568 116 turbinals.exe turbinals.exe PID 116 wrote to memory of 1568 116 turbinals.exe turbinals.exe PID 116 wrote to memory of 1568 116 turbinals.exe turbinals.exe PID 1568 wrote to memory of 3680 1568 turbinals.exe svchost.exe PID 1568 wrote to memory of 3680 1568 turbinals.exe svchost.exe PID 1568 wrote to memory of 3680 1568 turbinals.exe svchost.exe PID 1568 wrote to memory of 3680 1568 turbinals.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe"C:\Users\Admin\AppData\Local\Temp\0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"C:\Users\Admin\AppData\Local\Temp\0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\0d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134.exe"3⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD515efa07538fa420782993727012dbae1
SHA1d94ada66f78b781f1a9810649fb9d0a87c6454b4
SHA2560c9f42a467bda95f582e2b17a0ecc29c904c1ecc80ba807dd748716a809ce8b0
SHA512b3f95f8e3c74deb60ca44d785f988e6abc6765709699a18983560f90e80b8729704a822d89a970e20682466cabdfd44d86c24c502c70222b8472ddfd6d2b1191
-
Filesize
410KB
MD5a82ba22217252a8c8cd0c85b9865fa6b
SHA18c6733e9b63918e05bf67b382008f2d55628bb15
SHA2569f5cac95bb6aebffd7b44c15bba728d53f986f08710caee5ab7bf9fc4dc153bb
SHA51229a2b136adddadcee9ec51f2831834a7d0362cd63afdd6824f749ec4f587676d9d3b7836e0aa0d5b41eec3ffd962b82274d2a055c3e779ba12e1436f7dc9a833
-
Filesize
14KB
MD5999c01196577c85c5ced1a8cd6599277
SHA1a57bd38b75a7ab0085669e41b71dab75be46f419
SHA256f587c9d5dd6b03af588121eb7e53a0aeb468460039fd7fe779490a5246405cce
SHA512f4f0fdcb3f639177e6a7abac1fe021dca49db57b503ac3a1eda3465b8be67082de545ad4ba9956306b70a593d2b8d30657a7772f8e9d8c347a936671f85fa9be
-
Filesize
128KB
MD58bea914492276c119fe20f60ddc8d52d
SHA16088f82cb5b4b3cabeb003b902210e35d7df78ee
SHA256639c1a1ac0832626e6dcbd75b917b19ab63750195649bfaf224dc560e207fbe7
SHA512160a509e58b5600e0249e1c1ab820c105d6d25d5f1db7657a065ccec4ea5ee345d12f05656b453ea49d0023b2d666e1bd1b0ea0cc3a0089c988cc04312d739f6
-
Filesize
469KB
MD5e61f842fcbf6cd5c1c4c51ac72f723b1
SHA15aba61a4ef5a08aa1d5ad5d8f53ed17c360655c8
SHA25666c9e3d3b093b84cb142232d8cc4007ac17bc1d3457a7d3b78f86d28d653bd6d
SHA5125d2aa8a3b53a65d0ffaf219b898617ffac60204bfe58577b95c0b2e43a7398c1926f9acb4be18995e9e107a77c4a12ed6d1781408a849163f45f41381ec3ebbb
-
Filesize
174KB
MD532ec591fa73cb29e3771a6515d1cddf6
SHA15713e17a805078d30c343670c3e73623f19b36b2
SHA2569168093424ff90ffc69232e9cfd3cf137de4bdb8cb935deea45f5a693d6386aa
SHA5124c1455cc93e04f6576430aee4b2058141cd64b6355ac2f51c1b47269e8426eae81ee931ddbfb8d77a352244bd076fd70e8118dfc53b0c656b4e3e442e2a2784c
-
Filesize
1.0MB
MD5fc8e03a9454af696d8825eb6bbe82f90
SHA1fbdaba556ea8fa0a902667d42347ff078279f36f
SHA2560d4a31674be60a1215c15152674c2ffb7614870a57534e4d2267d3196eecd134
SHA51272b6c3d00b75d597f3291f07dd7b1f698b8b284f5a09084e6f5db759a8fb9b88932318bbcaa2381cbc5ab7b1def9dc0316b504c09db52955a022373689d21ce4