Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe
Resource
win7-20241010-en
General
-
Target
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe
-
Size
1.0MB
-
MD5
3ac5c2f48370ff445ffb4f99c94014af
-
SHA1
275c43f16565d071d0683471c3b6fd68d20fbbe2
-
SHA256
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7
-
SHA512
554258bf14b235fb229cb28778b1d1a5715c1c74c128c6f955567a00345e8e1c0736520649be9f8d02907aca838d018c55a5cf4f4cb27be119e8f7977a9b0504
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCDH1MJ55AxaiKDeLRR:7JZoQrbTFZY1iaCLQ56aifT
Malware Config
Extracted
remcos
OCT 28
myhost001.myddns.me:9373
103.161.133.98:4804
103.161.133.98:9373
myhost001.myddns.me:4804
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-47R6I4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
Processes:
turbinals.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\turbinals.vbs turbinals.exe -
Executes dropped EXE 1 IoCs
Processes:
turbinals.exepid process 3064 turbinals.exe -
Loads dropped DLL 1 IoCs
Processes:
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exepid process 2828 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Local\enterogenous\turbinals.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
turbinals.exedescription pid process target process PID 3064 set thread context of 2752 3064 turbinals.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exeturbinals.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
turbinals.exepid process 3064 turbinals.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2752 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exeturbinals.exedescription pid process target process PID 2828 wrote to memory of 3064 2828 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 2828 wrote to memory of 3064 2828 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 2828 wrote to memory of 3064 2828 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 2828 wrote to memory of 3064 2828 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 3064 wrote to memory of 2752 3064 turbinals.exe svchost.exe PID 3064 wrote to memory of 2752 3064 turbinals.exe svchost.exe PID 3064 wrote to memory of 2752 3064 turbinals.exe svchost.exe PID 3064 wrote to memory of 2752 3064 turbinals.exe svchost.exe PID 3064 wrote to memory of 2752 3064 turbinals.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD51fa4f458794eeef4adb8e18cc96ba34d
SHA12706570cc9d82272458155acdacd8e9e2b89c3d7
SHA2560b8202796e1e25945c7b1a136fbd941044e056b7b31835cf7627ecd41a590eff
SHA512df634d6a2336d02849b7bc7464de3809a9b03046b7d5f3a556436ee5a47f4b96aebd3db32aad3c79a42f59a7be3e9dc06d8dfb2b5da5b2b85cb835b4839ee1de
-
Filesize
469KB
MD5e61f842fcbf6cd5c1c4c51ac72f723b1
SHA15aba61a4ef5a08aa1d5ad5d8f53ed17c360655c8
SHA25666c9e3d3b093b84cb142232d8cc4007ac17bc1d3457a7d3b78f86d28d653bd6d
SHA5125d2aa8a3b53a65d0ffaf219b898617ffac60204bfe58577b95c0b2e43a7398c1926f9acb4be18995e9e107a77c4a12ed6d1781408a849163f45f41381ec3ebbb
-
Filesize
174KB
MD532ec591fa73cb29e3771a6515d1cddf6
SHA15713e17a805078d30c343670c3e73623f19b36b2
SHA2569168093424ff90ffc69232e9cfd3cf137de4bdb8cb935deea45f5a693d6386aa
SHA5124c1455cc93e04f6576430aee4b2058141cd64b6355ac2f51c1b47269e8426eae81ee931ddbfb8d77a352244bd076fd70e8118dfc53b0c656b4e3e442e2a2784c
-
Filesize
1.0MB
MD53ac5c2f48370ff445ffb4f99c94014af
SHA1275c43f16565d071d0683471c3b6fd68d20fbbe2
SHA25680d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7
SHA512554258bf14b235fb229cb28778b1d1a5715c1c74c128c6f955567a00345e8e1c0736520649be9f8d02907aca838d018c55a5cf4f4cb27be119e8f7977a9b0504