Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
0a8711fa1cb4189ab364c217db5f3620
-
SHA1
94ee709ab608d9d4ed6143a1deae85dd9fd812b3
-
SHA256
437c785b2093ffb955f17d63758cfb10e741509415cc55de8050e2d918716a4a
-
SHA512
8176f9534103704ef3b28ed2c5ab5f79cc7a19ee535017a763727b365d7825d3bb2ddf9a9fc3eae13eac4e3cfa95ce6887362d564db2c0440d0dab5cfdb1ebab
-
SSDEEP
24576:Y/WWf67etHLvLdh+dLNuK5imSFRWct3BfA59jACSr6ggTan9mTYdGvhH0WygS:Uf66tXdh+147YcXIfUCc6bG9DgS
Malware Config
Extracted
remcos
mouse
oportunidad-escolombiasegura.cfd:3020
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
registro
-
mouse_option
false
-
mutex
ladsjalfhfzmvqpowieyr-3PLE3H
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QuickTextPaste = "C:\\Users\\Admin\\Pictures\\QuickTextPaste\\Bin\\QuickTextPaste.exe" file.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 436 set thread context of 2456 436 file.exe 94 PID 2456 set thread context of 3988 2456 csc.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 csc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3988 InstallUtil.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 436 wrote to memory of 2456 436 file.exe 94 PID 436 wrote to memory of 2456 436 file.exe 94 PID 436 wrote to memory of 2456 436 file.exe 94 PID 436 wrote to memory of 2456 436 file.exe 94 PID 436 wrote to memory of 2456 436 file.exe 94 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104 PID 2456 wrote to memory of 3988 2456 csc.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD530a0b7f8af697dab96081148ce3d4a88
SHA1bb9b46721a520953a9947cb645c9377e0a047b83
SHA256bfa92a5b8d7100e0a750f68548013a238887141582f4e0267f405e86478000dd
SHA5125bfad95b5d52dd86b18195bd46682fc878aef07db129ef6ce7424b9c3d918dc182c5c11e44721909531b8609bed53f2f4d596d4a707cf21f7bfb3be543e8b2e9