Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
Your file name without extension goes here.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Your file name without extension goes here.exe
Resource
win10v2004-20241007-en
General
-
Target
Your file name without extension goes here.exe
-
Size
2.0MB
-
MD5
4c19699cbaac64e5bc471cef0b6f0e68
-
SHA1
08b8eb14d91085cc02448874c134c9d1905ae597
-
SHA256
e5cb1dc5f98ed0a82fb5d98f858c5efc7a23ea7f62071a00a8d40a85591ff67a
-
SHA512
76772e10da3f4f3fa540869be721ff8b2249994a6795a338bfda789fe9090d442820991df415349675d8a050998595735f563515c479d3e65de2949d9e1c7065
-
SSDEEP
12288:t+LbX5HPxKOza48US5HbWjKEhz8DEkE+jZZk/TVRzAy1LsAoKLjmVD1a:ALlHPIgtSxbSKEHkH+/TVRzVsA6VD1a
Malware Config
Extracted
remcos
RemoteHost
192.3.220.30:8080
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-SF7E52
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 2896 1640 Your file name without extension goes here.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2056 1640 Your file name without extension goes here.exe 31 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2244 1640 Your file name without extension goes here.exe 32 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2896 1640 Your file name without extension goes here.exe 33 PID 1640 wrote to memory of 2728 1640 Your file name without extension goes here.exe 34 PID 1640 wrote to memory of 2728 1640 Your file name without extension goes here.exe 34 PID 1640 wrote to memory of 2728 1640 Your file name without extension goes here.exe 34 PID 1640 wrote to memory of 2728 1640 Your file name without extension goes here.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Your file name without extension goes here.exe"C:\Users\Admin\AppData\Local\Temp\Your file name without extension goes here.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2244
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵PID:2728
-