Analysis
-
max time kernel
119s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
Resource
win10v2004-20241007-en
General
-
Target
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
-
Size
1.3MB
-
MD5
358ec1b6439850f0bb6ccad7131cf347
-
SHA1
a8e6f81f044051e6cdc829e99a31be3d6a7d6779
-
SHA256
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629
-
SHA512
5d95aed5645d975f243bda9d1fe624f8b83ee4255974eb6bc2db78cc42e80d97b4056f959fcbe2cfeb59a7db40ecd4a8ca35c8c4e141494546b850eacc72e799
-
SSDEEP
24576:rAOcZEhGZJLnKjCT+8RrtqrpUu8sR0coTvAiHca6TPY5I7nT1RMwa+NI:tMZU/SrtqrpccOv/HP6c5IzTXM7+NI
Malware Config
Extracted
remcos
3.3.0 Pro
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
Processes:
bmxbniuglo.pifRegSvcs.exepid process 564 bmxbniuglo.pif 2564 RegSvcs.exe -
Loads dropped DLL 5 IoCs
Processes:
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exebmxbniuglo.pifpid process 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe 564 bmxbniuglo.pif -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bmxbniuglo.pifdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\45235440\\BMXBNI~1.PIF c:\\45235440\\JIFVHS~1.TCL" bmxbniuglo.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bmxbniuglo.pifdescription pid process target process PID 564 set thread context of 2564 564 bmxbniuglo.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exemshta.exemshta.exemshta.exemshta.exe5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exebmxbniuglo.pifmshta.exemshta.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmxbniuglo.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bmxbniuglo.pifpid process 564 bmxbniuglo.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2564 RegSvcs.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exebmxbniuglo.pifdescription pid process target process PID 2700 wrote to memory of 564 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 2700 wrote to memory of 564 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 2700 wrote to memory of 564 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 2700 wrote to memory of 564 2700 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 564 wrote to memory of 756 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 756 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 756 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 756 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2556 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2556 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2556 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2556 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2068 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2068 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2068 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2068 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 3032 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 3032 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 3032 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 3032 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1640 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1640 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1640 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1640 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1184 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1184 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1184 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1184 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1788 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1788 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1788 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 1788 564 bmxbniuglo.pif mshta.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe PID 564 wrote to memory of 2564 564 bmxbniuglo.pif RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe"C:\Users\Admin\AppData\Local\Temp\5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\45235440\bmxbniuglo.pif"C:\45235440\bmxbniuglo.pif" jifvhstup.tcl2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD58e699954f6b5d64683412cc560938507
SHA18ca6708b0f158eacce3ac28b23c23ed42c168c29
SHA256c9a2399cc1ce6f71db9da2f16e6c025bf6cb0f4345b427f21449cf927d627a40
SHA51213035106149c8d336189b4a6bdaf25e10ac0b027baea963b3ec66a815a572426b2e9485258447cf1362802a0f03a2aa257b276057590663161d9d55d5b737b02
-
Filesize
56KB
MD58b670b655cf5bdbec4e8bf031a5c303a
SHA1446d41c4e7a03d7e21261b52bc42a499e78697e8
SHA25658ffca8fbe9fe189e29909b12d8306af25dcea9b98af76167905d3f7d27555f1
SHA512d95918f4a5fd2649298b1218d4e62e8339d59eda01a47708c2934bbec6d7f0e16f68a8abc27c178dfe117c73a4e36083d1ca58e106900bde945179b1440fcffc
-
Filesize
919KB
MD503371574057f34d8f0cd8b857234477e
SHA1fabea7c051eb26d402e42be3279c24b51243172e
SHA2561093ea8b90ac829a7ca7058f5e7aafb74012a331090e52c3f2e7229a70895f08
SHA51282b25daf3662746f1d009c2ee2bc1f01715389d5545d883f3c795a8557d5796711f49840fbb5728081fd22203e961a82225f70a75ee7c2d29d1664c68f0f6f54
-
Filesize
148B
MD5a9c383871c01ae719771eafca05e2bc1
SHA156d6f2c93d31abd0bac76f97d66cc77ddc360317
SHA25697d2ec55666270132d3cb98a76cf04c39212659e7c303ae1db6fc591fbb2085f
SHA512a77ebab462206c0d4c89c704baf1402416d0e44b102648998817db4e293d416eb931f44916a39cd11e9e3ae815957d0f9d976e702970e71065ecd2f0dd84e1e2
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215