Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
XTU_7.13.1.5/XTUSetup_7.13.1.5.exe
Resource
win7-20240729-en
General
-
Target
XTU_7.13.1.5/XTUSetup_7.13.1.5.exe
-
Size
3.0MB
-
MD5
66077408ca68b2fcd2a80e86e1797900
-
SHA1
7c20e8699629a2363ad3795248dbb19a07ea68e8
-
SHA256
72d6634536e28daf1008d949c3683ee5a31bffeeabe5443a84b5023c5ee48470
-
SHA512
f02864e4201caa2427942cd97e5a834cdd82cab766f3e85e42f8f87e66e220d93c567497f248bfb8e946c1bd5e5f599bad7a991a85a36d2920c696e5e2a909bb
-
SSDEEP
49152:ZEA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTVd3338e:t92bz2Eb6pd7B6bAGx7n333J
Malware Config
Extracted
remcos
NewTest
65.21.12.146:6165
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
GttttSFFFSSS-FH61YW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
XTUSetup_7.13.1.5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation XTUSetup_7.13.1.5.exe -
Executes dropped EXE 3 IoCs
Processes:
XTUSetup_7.13.1.5.exeICQ.exeXTUSetup_7.13.1.5.exepid process 1640 XTUSetup_7.13.1.5.exe 2392 ICQ.exe 4360 XTUSetup_7.13.1.5.exe -
Loads dropped DLL 13 IoCs
Processes:
ICQ.exeXTUSetup_7.13.1.5.exepid process 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 2392 ICQ.exe 4360 XTUSetup_7.13.1.5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ICQ.exedescription pid process target process PID 2392 set thread context of 2356 2392 ICQ.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
XTUSetup_7.13.1.5.exeXTUSetup_7.13.1.5.exeXTUSetup_7.13.1.5.exeICQ.exeXTUSetup_7.13.1.5.execmd.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XTUSetup_7.13.1.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XTUSetup_7.13.1.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XTUSetup_7.13.1.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XTUSetup_7.13.1.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
XTUSetup_7.13.1.5.exeICQ.execmd.exepid process 336 XTUSetup_7.13.1.5.exe 336 XTUSetup_7.13.1.5.exe 2392 ICQ.exe 2356 cmd.exe 2356 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
ICQ.execmd.exepid process 2392 ICQ.exe 2356 cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
XTUSetup_7.13.1.5.exepid process 336 XTUSetup_7.13.1.5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
XTUSetup_7.13.1.5.exeXTUSetup_7.13.1.5.exeXTUSetup_7.13.1.5.exeICQ.execmd.exedescription pid process target process PID 2176 wrote to memory of 336 2176 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 2176 wrote to memory of 336 2176 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 2176 wrote to memory of 336 2176 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 336 wrote to memory of 1640 336 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 336 wrote to memory of 1640 336 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 336 wrote to memory of 1640 336 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 336 wrote to memory of 2392 336 XTUSetup_7.13.1.5.exe ICQ.exe PID 336 wrote to memory of 2392 336 XTUSetup_7.13.1.5.exe ICQ.exe PID 336 wrote to memory of 2392 336 XTUSetup_7.13.1.5.exe ICQ.exe PID 1640 wrote to memory of 4360 1640 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 1640 wrote to memory of 4360 1640 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 1640 wrote to memory of 4360 1640 XTUSetup_7.13.1.5.exe XTUSetup_7.13.1.5.exe PID 2392 wrote to memory of 2356 2392 ICQ.exe cmd.exe PID 2392 wrote to memory of 2356 2392 ICQ.exe cmd.exe PID 2392 wrote to memory of 2356 2392 ICQ.exe cmd.exe PID 2392 wrote to memory of 2356 2392 ICQ.exe cmd.exe PID 2356 wrote to memory of 3452 2356 cmd.exe explorer.exe PID 2356 wrote to memory of 3452 2356 cmd.exe explorer.exe PID 2356 wrote to memory of 3452 2356 cmd.exe explorer.exe PID 2356 wrote to memory of 3452 2356 cmd.exe explorer.exe PID 2356 wrote to memory of 3452 2356 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe"C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe"C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe" /VERYSILENT2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe"C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\Temp\{1FA9BC17-C740-41A0-ACA3-EC71BC50E5CA}\.cr\XTUSetup_7.13.1.5.exe"C:\Windows\Temp\{1FA9BC17-C740-41A0-ACA3-EC71BC50E5CA}\.cr\XTUSetup_7.13.1.5.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe" -burn.filehandle.attached=532 -burn.filehandle.self=5404⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
C:\Users\Admin\AppData\Roaming\ICQ.exe"C:\Users\Admin\AppData\Roaming\ICQ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53f75119bed7b8ffb2f2a5df7d013d8d7
SHA10aff60decf4528185205b4659152f4744f7256cd
SHA256786e07efc1b5b9f334068b4468402145c378a68f93833c62b652064b8737dea9
SHA512673d40e8c560cdea07ceeb556d369ca380ed5182e2cdda3d0b7c64b9bc508d3f0a7603ac22badb63989e5c9a7fd8bcd64eb27dc0467d87b9849c8375cf2e18b8
-
Filesize
168KB
MD5aef6452711538d9021f929a2a5f633cf
SHA1205b7fab75e77d1ff123991489462d39128e03f6
SHA256e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac
SHA5127ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7
-
Filesize
106KB
MD5815b07c37c83b13457d37ca8c6a7a561
SHA1746138b85e5611fd058c008411889a15870083cd
SHA256153c1b5e96e7bc4c9f858c3cc3bc6cd5e09ef68776d95871ca38824c430654c4
SHA5128949ab1deae036ae785ad20c634519aa368b4768f0dd65c0dc53f8ea70dd7d707c984277b914de14054eb8a044182ff78205e3a02555e377750bb829760b8c31
-
Filesize
205KB
MD5580fdcf4c38b155708fcfc2fc375b287
SHA163d689b601037f7a272cfc3b88fcd892d7391764
SHA2562e5f2d3e4544b318152ee7b00a47f664b7414941ae284deb41ead1f09ac63475
SHA512a691ce52cf62410148ff9a8e83f43930601d2053f0b0516f1923e9e5408d7a78a6eafb843c61078a3b99993fa616c612fdffc6d836599793c56984fa8d0519fc
-
Filesize
219KB
MD598a71909605b7d088f82d66abc64d4c2
SHA11e250127851a331dd914215348ef51fff78442c9
SHA25646410947d60a8b92869aa2cf27b57a94c710047f168ac3bc23879a8461f8686a
SHA512efa8e407e3fbfb81da07b584b8bbd2a440074388ae3ff6175abc88614b42b53ca70206e7ada00273457fafac58d7729f1c945a9e79ce793bc48229035194b267
-
Filesize
824KB
MD560a5383ba17d8f519cb4356e28873a14
SHA16bf70393d957320a921226c7fcdf352a0a67442d
SHA25680878e4543959b63cbd87e3ebb82f4988cbbdf9da564370aa15410783c5f343f
SHA512a0e0ef1d821e13977d14a806357128285edc0a26c01dcf9fd99e7c62f8efccdf608b1c0dceb1f3f40e988692eb549e22193d9ce253a1c0c1d8b10c46955bee12
-
Filesize
385KB
MD597d6efb8b8e0b0f03701a7bafc398545
SHA10fe11e0b7f47fdec9aaa98b83728c125409e9d5b
SHA25651c8715fac6797b7f962a68903f1f994c2af1088ac31972b5e512dab5ab4fd8e
SHA5122bf8935ad96f35586be6074e8798fa36ee13a05cef05aa0df120ef6800cc1d941310c672894d2380b87c7491663c137fa5bcade4a732bcc6448ba3bf0badb2d7
-
Filesize
619KB
MD56da9a492898b66db78f5c9d3fc7ecc64
SHA1d264f67d92ccd4cfeaed1510ed0b6ae90d3f7db4
SHA25650dfc607913a47dd266e27f6533f3f6b8f9fe995582f7662a944149a26b5054c
SHA51211bc138d16f279d70ece09e3d238ce891bc5015b6d49a750e153c2b9286bf95e285e818ed5e25e7c731cdfff1324cdb74155f68fda0ef8104eb0d554e2b2923e
-
Filesize
50.0MB
MD5d6e27788acf558b6d808443bf7ba1256
SHA1ded76dab63c1c9e8ccf381451b51f834884017a8
SHA256a7d8a8d0b3946412afd642b5b4a01e0133103e0ec0306a3f03c2b35c060e1dfb
SHA51209d7eb314566f11a21ad29aa94c4a0ab02644604e2a554057a6b9854245ec78a882731975411b777c1d3713853d352fdc3c162bf25e5f6d84fbb81a3b5b0e9db
-
Filesize
1.0MB
MD5ebf03a3293b0cbc2c7c21168bd82dd2c
SHA113a7741fba973678cff14d45f180917d2d49afa3
SHA256d2eb81404ee8f8f27fa20fe23f0c6258135a93295f4fb1f0fa10aeb1e5f5e617
SHA5125937ad7d89c84da5191c8910da3cd6e909d95f3b78f87b3a6db1d1b82e7b65dd3d734be73f0ecdc8bde084feacb5776038bc32ae620aac630b6dc08be5d47dd7
-
Filesize
764KB
MD54f27d1bacaf09d1919484355b341c868
SHA1f1be78d484235270a1416c6acb20e2915ae050db
SHA25612cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450
SHA512328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced
-
Filesize
488KB
MD5561fa2abb31dfa8fab762145f81667c2
SHA1c8ccb04eedac821a13fae314a2435192860c72b8
SHA256df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b
SHA5127d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
244KB
MD5d145903e217ddde20ce32ed9e5074e16
SHA1bdb3265d872f446d7445aae4f2d0beba5dae3bd8
SHA2569317971d3615415691420d06b06de89b67aea164877b74e308bb9c338ca0eca4
SHA51200e7df32ab3c8a46b4e8761634ddeac28410f46a9312923f46b1d83376d69489653763661f2c51ac9f85028a11d8496c911eabcb55a19222caf311be61504666
-
Filesize
648KB
MD5ea95350eb108975eb9fb296847041831
SHA1473c594c0b180a68fdb75b55967336cd458e1d3b
SHA256cf55a194e974042437a475531c287df2c99de94d2d862d7c7525be02bea1163e
SHA5129e73c24c8f8501accf7705fb721fb44e2449c3a211fbf9e3f57c796c7b17ac02b204834a3d34083fbdc32a6d999edaa2b14934d3d66cf3647e3fa4993ba3d97a
-
Filesize
3KB
MD59c2693cd6944a2d82e82c8a50c33bf3c
SHA11faeb91c36d2c4e97d57800cdf08d68d434e5550
SHA25696116bfefabee7cae5090d9f0d8538123a9b21d1251591def8f3608ca6823292
SHA51254d5d12609afd75338f577b909191db5ec55d27d00920b45ca89e5726f1097e237068b76a7676686d759ed1ebc38874bdda6a65afcfd0b19e86dbf23b4251844
-
Filesize
203KB
MD50ba387d66175c20452de372f8dbb79fe
SHA15411d41a7d88291b97fb9573eb6448c72e773b70
SHA2567b3d4a22a56cd80f19c48a321f978f728d34b8227cdc7fcadeb76b7506b2bb33
SHA51213ec6e6ddc602e8053aadd4dd84ed87c23b581f2a41d738e32a522128ca4985dcfcaedc7fab192085f0eb4facd1cd7ad91ccaf8505491e29288d2f66cbf705fd