Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
Pagamento.UniCredit.pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Pagamento.UniCredit.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
Pagamento.UniCredit.pdf.exe
-
Size
16KB
-
MD5
6d99c0cd5292f377d7334ad0a90a19f4
-
SHA1
6de58e451707b34166dc132876d4c726dbb85e59
-
SHA256
9b91f38ed7a92a5b3223698c5be0bb0daaa1230981501fd306f5b30744317bbc
-
SHA512
537df3bcfcc37ca896dd3cff9d28509c4e1b64374ca6d7a601fcbdb424dc6292fe92a9e61cdb3b509cd3b02e60ca821489ec4cce2f540aabd4ded143853f6361
-
SSDEEP
192:F3qy1lV+ZfxqFkyPx6UhTv/d/qI0CgQRHzLbGL3HsOe0U/IkG+grXDunbDeY:v1afxhKzfqtCjVE8Oe9+XDunbDe
Malware Config
Extracted
remcos
RemoteHost
162.251.122.76:7119
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-P2SX34
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Pagamento.UniCredit.pdf.exedescription pid process target process PID 452 created 3432 452 Pagamento.UniCredit.pdf.exe Explorer.EXE -
Drops startup file 1 IoCs
Processes:
Pagamento.UniCredit.pdf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EvidenceObject.vbs Pagamento.UniCredit.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Pagamento.UniCredit.pdf.exedescription pid process target process PID 452 set thread context of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Pagamento.UniCredit.pdf.exeInstallUtil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pagamento.UniCredit.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Pagamento.UniCredit.pdf.exepid process 452 Pagamento.UniCredit.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Pagamento.UniCredit.pdf.exedescription pid process Token: SeDebugPrivilege 452 Pagamento.UniCredit.pdf.exe Token: SeDebugPrivilege 452 Pagamento.UniCredit.pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Pagamento.UniCredit.pdf.exedescription pid process target process PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe PID 452 wrote to memory of 3544 452 Pagamento.UniCredit.pdf.exe InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Pagamento.UniCredit.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Pagamento.UniCredit.pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3544
-