Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe
Resource
win7-20241010-en
General
-
Target
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe
-
Size
1.0MB
-
MD5
3ac5c2f48370ff445ffb4f99c94014af
-
SHA1
275c43f16565d071d0683471c3b6fd68d20fbbe2
-
SHA256
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7
-
SHA512
554258bf14b235fb229cb28778b1d1a5715c1c74c128c6f955567a00345e8e1c0736520649be9f8d02907aca838d018c55a5cf4f4cb27be119e8f7977a9b0504
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCDH1MJ55AxaiKDeLRR:7JZoQrbTFZY1iaCLQ56aifT
Malware Config
Extracted
remcos
OCT 28
myhost001.myddns.me:9373
103.161.133.98:4804
103.161.133.98:9373
myhost001.myddns.me:4804
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-47R6I4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
Processes:
turbinals.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\turbinals.vbs turbinals.exe -
Executes dropped EXE 2 IoCs
Processes:
turbinals.exeturbinals.exepid process 2560 turbinals.exe 1116 turbinals.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
turbinals.exedescription pid process target process PID 1116 set thread context of 4088 1116 turbinals.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
turbinals.exeturbinals.exesvchost.exe80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
turbinals.exeturbinals.exepid process 2560 turbinals.exe 1116 turbinals.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 4088 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exeturbinals.exeturbinals.exedescription pid process target process PID 1544 wrote to memory of 2560 1544 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 1544 wrote to memory of 2560 1544 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 1544 wrote to memory of 2560 1544 80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe turbinals.exe PID 2560 wrote to memory of 3664 2560 turbinals.exe svchost.exe PID 2560 wrote to memory of 3664 2560 turbinals.exe svchost.exe PID 2560 wrote to memory of 3664 2560 turbinals.exe svchost.exe PID 2560 wrote to memory of 1116 2560 turbinals.exe turbinals.exe PID 2560 wrote to memory of 1116 2560 turbinals.exe turbinals.exe PID 2560 wrote to memory of 1116 2560 turbinals.exe turbinals.exe PID 1116 wrote to memory of 4088 1116 turbinals.exe svchost.exe PID 1116 wrote to memory of 4088 1116 turbinals.exe svchost.exe PID 1116 wrote to memory of 4088 1116 turbinals.exe svchost.exe PID 1116 wrote to memory of 4088 1116 turbinals.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\80d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7.exe"3⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\enterogenous\turbinals.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b8ac5a5cd7b195c92900adec3a386da4
SHA15815a3a7dd81295a08b25539b2948f12bd1fea21
SHA25601845d535471e14c2d69ee6cf173e437f80b1d56f11e787217d66fc4bd1b8dbc
SHA51240fa29eca0a8186b3cd8a740fdc04d44c430d04b07a47eeba64c411aa488556bee3fbe23bfdf5f4fc01658b0184ea2f3227200196c9d1c2624870e509d7759c6
-
Filesize
410KB
MD5a82ba22217252a8c8cd0c85b9865fa6b
SHA18c6733e9b63918e05bf67b382008f2d55628bb15
SHA2569f5cac95bb6aebffd7b44c15bba728d53f986f08710caee5ab7bf9fc4dc153bb
SHA51229a2b136adddadcee9ec51f2831834a7d0362cd63afdd6824f749ec4f587676d9d3b7836e0aa0d5b41eec3ffd962b82274d2a055c3e779ba12e1436f7dc9a833
-
Filesize
14KB
MD5999c01196577c85c5ced1a8cd6599277
SHA1a57bd38b75a7ab0085669e41b71dab75be46f419
SHA256f587c9d5dd6b03af588121eb7e53a0aeb468460039fd7fe779490a5246405cce
SHA512f4f0fdcb3f639177e6a7abac1fe021dca49db57b503ac3a1eda3465b8be67082de545ad4ba9956306b70a593d2b8d30657a7772f8e9d8c347a936671f85fa9be
-
Filesize
469KB
MD5e61f842fcbf6cd5c1c4c51ac72f723b1
SHA15aba61a4ef5a08aa1d5ad5d8f53ed17c360655c8
SHA25666c9e3d3b093b84cb142232d8cc4007ac17bc1d3457a7d3b78f86d28d653bd6d
SHA5125d2aa8a3b53a65d0ffaf219b898617ffac60204bfe58577b95c0b2e43a7398c1926f9acb4be18995e9e107a77c4a12ed6d1781408a849163f45f41381ec3ebbb
-
Filesize
174KB
MD532ec591fa73cb29e3771a6515d1cddf6
SHA15713e17a805078d30c343670c3e73623f19b36b2
SHA2569168093424ff90ffc69232e9cfd3cf137de4bdb8cb935deea45f5a693d6386aa
SHA5124c1455cc93e04f6576430aee4b2058141cd64b6355ac2f51c1b47269e8426eae81ee931ddbfb8d77a352244bd076fd70e8118dfc53b0c656b4e3e442e2a2784c
-
Filesize
1.0MB
MD53ac5c2f48370ff445ffb4f99c94014af
SHA1275c43f16565d071d0683471c3b6fd68d20fbbe2
SHA25680d9d24c7cfd67002614e2f5a212175946386f889eddda66f6e7a423f9bbf8f7
SHA512554258bf14b235fb229cb28778b1d1a5715c1c74c128c6f955567a00345e8e1c0736520649be9f8d02907aca838d018c55a5cf4f4cb27be119e8f7977a9b0504