Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
eCertificate_of_Creditable_Tax.exe
Resource
win7-20240903-en
General
-
Target
eCertificate_of_Creditable_Tax.exe
-
Size
520KB
-
MD5
a012b50429830817e338ccb3ff87ee45
-
SHA1
1adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
-
SHA256
2a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
-
SHA512
fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe
-
SSDEEP
12288:MguY0rIobzV2KOPxGkYh+BppwW1xErml3PM5I6SWTmCxr3B9jS:IYDcBrkvr71xEofOIBw9jS
Malware Config
Extracted
remcos
HOPE21
uettw81jsq.freedynamicdns.net:6609
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-EF1FKW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 3 IoCs
Processes:
Gemas.exeGemas.exeGemas.exepid process 2352 Gemas.exe 948 Gemas.exe 2256 Gemas.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
eCertificate_of_Creditable_Tax.exeGemas.exeGemas.exeGemas.exedescription pid process target process PID 2644 set thread context of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2352 set thread context of 1980 2352 Gemas.exe vbc.exe PID 948 set thread context of 2320 948 Gemas.exe vbc.exe PID 2256 set thread context of 1940 2256 Gemas.exe vbc.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeschtasks.execmd.execmd.exeGemas.execmd.exeschtasks.execmd.execmd.exeeCertificate_of_Creditable_Tax.exevbc.exeschtasks.execmd.exeGemas.exeschtasks.execmd.execmd.exeGemas.execmd.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eCertificate_of_Creditable_Tax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2580 schtasks.exe 572 schtasks.exe 892 schtasks.exe 2036 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eCertificate_of_Creditable_Tax.execmd.exetaskeng.exeGemas.execmd.exedescription pid process target process PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 2780 2644 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2644 wrote to memory of 1044 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 1044 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 1044 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 1044 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2756 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2756 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2756 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2756 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2756 wrote to memory of 2580 2756 cmd.exe schtasks.exe PID 2756 wrote to memory of 2580 2756 cmd.exe schtasks.exe PID 2756 wrote to memory of 2580 2756 cmd.exe schtasks.exe PID 2756 wrote to memory of 2580 2756 cmd.exe schtasks.exe PID 2644 wrote to memory of 2464 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2464 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2464 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2644 wrote to memory of 2464 2644 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2152 wrote to memory of 2352 2152 taskeng.exe Gemas.exe PID 2152 wrote to memory of 2352 2152 taskeng.exe Gemas.exe PID 2152 wrote to memory of 2352 2152 taskeng.exe Gemas.exe PID 2152 wrote to memory of 2352 2152 taskeng.exe Gemas.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1980 2352 Gemas.exe vbc.exe PID 2352 wrote to memory of 1684 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 1684 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 1684 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 1684 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 2040 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 2040 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 2040 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 2040 2352 Gemas.exe cmd.exe PID 2040 wrote to memory of 572 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 572 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 572 2040 cmd.exe schtasks.exe PID 2040 wrote to memory of 572 2040 cmd.exe schtasks.exe PID 2352 wrote to memory of 752 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 752 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 752 2352 Gemas.exe cmd.exe PID 2352 wrote to memory of 752 2352 Gemas.exe cmd.exe PID 2152 wrote to memory of 948 2152 taskeng.exe Gemas.exe PID 2152 wrote to memory of 948 2152 taskeng.exe Gemas.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A6FF0921-63FD-4B3D-B471-C0CC03317CA8} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:572
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5a012b50429830817e338ccb3ff87ee45
SHA11adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
SHA2562a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
SHA512fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe