Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
eCertificate_of_Creditable_Tax.exe
Resource
win7-20240903-en
General
-
Target
eCertificate_of_Creditable_Tax.exe
-
Size
520KB
-
MD5
a012b50429830817e338ccb3ff87ee45
-
SHA1
1adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
-
SHA256
2a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
-
SHA512
fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe
-
SSDEEP
12288:MguY0rIobzV2KOPxGkYh+BppwW1xErml3PM5I6SWTmCxr3B9jS:IYDcBrkvr71xEofOIBw9jS
Malware Config
Extracted
remcos
HOPE21
uettw81jsq.freedynamicdns.net:6609
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-EF1FKW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 3 IoCs
Processes:
Gemas.exeGemas.exeGemas.exepid process 2724 Gemas.exe 100 Gemas.exe 3636 Gemas.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
eCertificate_of_Creditable_Tax.exeGemas.exeGemas.exeGemas.exedescription pid process target process PID 1512 set thread context of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2724 set thread context of 2460 2724 Gemas.exe vbc.exe PID 100 set thread context of 4880 100 Gemas.exe vbc.exe PID 3636 set thread context of 1456 3636 Gemas.exe vbc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1628 4880 WerFault.exe vbc.exe 2748 1456 WerFault.exe vbc.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeschtasks.exeGemas.execmd.exeschtasks.exeeCertificate_of_Creditable_Tax.exevbc.exeschtasks.exeGemas.exeGemas.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eCertificate_of_Creditable_Tax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 932 schtasks.exe 4352 schtasks.exe 3496 schtasks.exe 4532 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eCertificate_of_Creditable_Tax.execmd.exeGemas.execmd.exeGemas.exedescription pid process target process PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 3156 1512 eCertificate_of_Creditable_Tax.exe vbc.exe PID 1512 wrote to memory of 5036 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 5036 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 5036 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 5100 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 5100 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 5100 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 5100 wrote to memory of 932 5100 cmd.exe schtasks.exe PID 5100 wrote to memory of 932 5100 cmd.exe schtasks.exe PID 5100 wrote to memory of 932 5100 cmd.exe schtasks.exe PID 1512 wrote to memory of 4060 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 4060 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1512 wrote to memory of 4060 1512 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 2460 2724 Gemas.exe vbc.exe PID 2724 wrote to memory of 1856 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 1856 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 1856 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 4672 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 4672 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 4672 2724 Gemas.exe cmd.exe PID 4672 wrote to memory of 4352 4672 cmd.exe schtasks.exe PID 4672 wrote to memory of 4352 4672 cmd.exe schtasks.exe PID 4672 wrote to memory of 4352 4672 cmd.exe schtasks.exe PID 2724 wrote to memory of 1800 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 1800 2724 Gemas.exe cmd.exe PID 2724 wrote to memory of 1800 2724 Gemas.exe cmd.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 4880 100 Gemas.exe vbc.exe PID 100 wrote to memory of 1968 100 Gemas.exe cmd.exe PID 100 wrote to memory of 1968 100 Gemas.exe cmd.exe PID 100 wrote to memory of 1968 100 Gemas.exe cmd.exe PID 100 wrote to memory of 2840 100 Gemas.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 5123⤵
- Program crash
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4880 -ip 48801⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 5123⤵
- Program crash
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1456 -ip 14561⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
520KB
MD5a012b50429830817e338ccb3ff87ee45
SHA11adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
SHA2562a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
SHA512fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe