Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
Your file name without extension goes here.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Your file name without extension goes here.exe
Resource
win10v2004-20241007-en
General
-
Target
Your file name without extension goes here.exe
-
Size
2.0MB
-
MD5
4c19699cbaac64e5bc471cef0b6f0e68
-
SHA1
08b8eb14d91085cc02448874c134c9d1905ae597
-
SHA256
e5cb1dc5f98ed0a82fb5d98f858c5efc7a23ea7f62071a00a8d40a85591ff67a
-
SHA512
76772e10da3f4f3fa540869be721ff8b2249994a6795a338bfda789fe9090d442820991df415349675d8a050998595735f563515c479d3e65de2949d9e1c7065
-
SSDEEP
12288:t+LbX5HPxKOza48US5HbWjKEhz8DEkE+jZZk/TVRzAy1LsAoKLjmVD1a:ALlHPIgtSxbSKEHkH+/TVRzVsA6VD1a
Malware Config
Extracted
remcos
RemoteHost
192.3.220.30:8080
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-SF7E52
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Your file name without extension goes here.exedescription pid process target process PID 4600 set thread context of 1088 4600 Your file name without extension goes here.exe ilasm.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ilasm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilasm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
Your file name without extension goes here.exedescription pid process target process PID 4600 wrote to memory of 4412 4600 Your file name without extension goes here.exe iexplore.exe PID 4600 wrote to memory of 4412 4600 Your file name without extension goes here.exe iexplore.exe PID 4600 wrote to memory of 4412 4600 Your file name without extension goes here.exe iexplore.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 4992 4600 Your file name without extension goes here.exe notepad.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1552 4600 Your file name without extension goes here.exe calc.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 1088 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 988 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 988 4600 Your file name without extension goes here.exe ilasm.exe PID 4600 wrote to memory of 988 4600 Your file name without extension goes here.exe ilasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Your file name without extension goes here.exe"C:\Users\Admin\AppData\Local\Temp\Your file name without extension goes here.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:4412
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:4992
-
-
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵PID:1552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵PID:988
-