Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20241007-en
General
-
Target
PO.exe
-
Size
1.3MB
-
MD5
5d15087ab767a84ec8e8805bb26eb8b8
-
SHA1
01bba4ff864c053b3485b20cb4e60666be7355a7
-
SHA256
6b509b581157e265d6e3d2bdeed463195464daeafe98b57cea4ef59141d21b62
-
SHA512
dcc463497cfbe933de85999b6010382b82a449f827621f1f5215a9459696f80172e69019b8d1385d2fc3edfe0543035b73042cbab7d2b860c8e382d8fa9d5805
-
SSDEEP
24576:ztb20pkaCqT5TBWgNQ7azerXt4yv6uaDWBq74Ws66A:wVg5tQ7azeryYA4OZj5
Malware Config
Extracted
remcos
RemoteHost
192.3.64.152:2559
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ZFXG9Y
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
Processes:
Bactris.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bactris.vbs Bactris.exe -
Executes dropped EXE 2 IoCs
Processes:
Bactris.exeBactris.exepid Process 3432 Bactris.exe 2360 Bactris.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cbf-9.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Bactris.exesvchost.exedescription pid Process procid_target PID 2360 set thread context of 4396 2360 Bactris.exe 86 PID 4396 set thread context of 1388 4396 svchost.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PO.exeBactris.exeBactris.exesvchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bactris.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bactris.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exepid Process 4396 svchost.exe 4396 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Bactris.exeBactris.exesvchost.exepid Process 3432 Bactris.exe 2360 Bactris.exe 4396 svchost.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
PO.exeBactris.exeBactris.exepid Process 4036 PO.exe 4036 PO.exe 3432 Bactris.exe 3432 Bactris.exe 2360 Bactris.exe 2360 Bactris.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
PO.exeBactris.exeBactris.exepid Process 4036 PO.exe 4036 PO.exe 3432 Bactris.exe 3432 Bactris.exe 2360 Bactris.exe 2360 Bactris.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
PO.exeBactris.exeBactris.exesvchost.exedescription pid Process procid_target PID 4036 wrote to memory of 3432 4036 PO.exe 83 PID 4036 wrote to memory of 3432 4036 PO.exe 83 PID 4036 wrote to memory of 3432 4036 PO.exe 83 PID 3432 wrote to memory of 756 3432 Bactris.exe 84 PID 3432 wrote to memory of 756 3432 Bactris.exe 84 PID 3432 wrote to memory of 756 3432 Bactris.exe 84 PID 3432 wrote to memory of 2360 3432 Bactris.exe 85 PID 3432 wrote to memory of 2360 3432 Bactris.exe 85 PID 3432 wrote to memory of 2360 3432 Bactris.exe 85 PID 2360 wrote to memory of 4396 2360 Bactris.exe 86 PID 2360 wrote to memory of 4396 2360 Bactris.exe 86 PID 2360 wrote to memory of 4396 2360 Bactris.exe 86 PID 2360 wrote to memory of 4396 2360 Bactris.exe 86 PID 4396 wrote to memory of 1388 4396 svchost.exe 87 PID 4396 wrote to memory of 1388 4396 svchost.exe 87 PID 4396 wrote to memory of 1388 4396 svchost.exe 87 PID 4396 wrote to memory of 1388 4396 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\corynteria\Bactris.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"3⤵PID:756
-
-
C:\Users\Admin\AppData\Local\corynteria\Bactris.exe"C:\Users\Admin\AppData\Local\corynteria\Bactris.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\corynteria\Bactris.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵PID:1388
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5dff4656eeb9273bfc7c07abe89b67ce8
SHA16835c2acbf72ffec1a4445aa6161d11ae0257820
SHA256e3106421fe9b46c09de3ca31bc0856efd2c0efb285d0418324d197cd30eb1a29
SHA5121b1cc1be47324732eb5bf19b05d4d16fef65a78779a1b7621f2a36576ff6d27c9735c0650e3a0ab18bf3e1ac49e76db2b03547628414a564e7b0b1789824653e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
483KB
MD510121f879e46a153d8a84858c3d92157
SHA18a3c78b464ea83838afc43da5eeedef974a1189c
SHA256fcdeaa445e4259175484e0f9305d97c8ab07710807282cb2aeb2deb603a36704
SHA512b21d0e23f0ec329c04d729c664564b9ef491d21b6fbcf0c907e7892c3d5b479dbed25826771bf84210b5964c24bfc9c74e57f29789b05de3db172aec7a101a52
-
Filesize
1.3MB
MD55d15087ab767a84ec8e8805bb26eb8b8
SHA101bba4ff864c053b3485b20cb4e60666be7355a7
SHA2566b509b581157e265d6e3d2bdeed463195464daeafe98b57cea4ef59141d21b62
SHA512dcc463497cfbe933de85999b6010382b82a449f827621f1f5215a9459696f80172e69019b8d1385d2fc3edfe0543035b73042cbab7d2b860c8e382d8fa9d5805