Analysis
-
max time kernel
98s -
max time network
136s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-11-2024 19:53
Behavioral task
behavioral1
Sample
test.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win11-20241007-en
General
-
Target
test.exe
-
Size
481KB
-
MD5
d9b9edd0788052df0c3c5767d6da2683
-
SHA1
e617350a65b2110f948d2a553498ed06bccbe385
-
SHA256
c24d9f1eea99dcbd0e97fef8e6c7b9c52ec641280880803e419a9ef953de66eb
-
SHA512
95e5146082fccd764f3090d8363c35c0d6b43b946e7c73a96ed1079fc964b36c6c5198fe329aaded35f637182e003d168513fd7abd82cdd24168f591a9fa75e9
-
SSDEEP
12288:buD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSI+DY:e09AfNIEYsunZvZ19Zbs
Malware Config
Extracted
remcos
RemoteHost
23.ip.gl.ply.gg:24321
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YVR15V
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Deletes itself 1 IoCs
Processes:
WScript.exepid Process 4848 WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
test.exedescription pid Process procid_target PID 804 set thread context of 568 804 test.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
test.exeiexplore.exeWScript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
Processes:
iexplore.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
test.exepid Process 804 test.exe 804 test.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
test.exepid Process 804 test.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
test.exeiexplore.exedescription pid Process procid_target PID 804 wrote to memory of 568 804 test.exe 81 PID 804 wrote to memory of 568 804 test.exe 81 PID 804 wrote to memory of 568 804 test.exe 81 PID 804 wrote to memory of 568 804 test.exe 81 PID 568 wrote to memory of 4848 568 iexplore.exe 90 PID 568 wrote to memory of 4848 568 iexplore.exe 90 PID 568 wrote to memory of 4848 568 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\litqbzehrwcpolnxbdaulwohm.vbs"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD5794c0260402b008b982625708a9f953b
SHA1e3481d118763daa784eeaed1708507ceede93b0f
SHA256ebd2bbc566fa89b655e09ea4877bc13ba30f0f4cfb134a647ccf7a909efb9ce0
SHA512ba3558fce45f9f0e6942789e08e6d14628f7abbb08248294850db707cc8b1cb84befcd7167c2de41b1b4584bd9060be1b95798eb49c18930ef87381c18ce04ac