Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 13:40
Behavioral task
behavioral1
Sample
z49FACTURA-0987678.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
z49FACTURA-0987678.exe
Resource
win10v2004-20241007-en
General
-
Target
z49FACTURA-0987678.exe
-
Size
854KB
-
MD5
876f47f33c5975497c15bf24d50952b5
-
SHA1
a47579ea0e5d47ceb89cbb3450f4c482768a0bf8
-
SHA256
49e8a1f12fb5202470604efe01c0d60949d20d302a76aed85b2a049e91266366
-
SHA512
7346f82c0c7065d2de4ec5d5747235ce0ada6e799e6cf461a57ce15969ccd0bf92bf7d5efb2e5b57ad4be0defd3a716bdb6a8c609e0abbe0fb3832f5cfbfd6c3
-
SSDEEP
24576:Zrl6kD68JmlotQf0hwmcZIR5MRsJOjOZW89S+7Ed7b:1l328U2yf0CmOeMRsnZW8o/h
Malware Config
Extracted
remcos
RemoteHost
192.210.150.26:8787
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R1T905
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
Processes:
turbinals.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\turbinals.vbs turbinals.exe -
Executes dropped EXE 1 IoCs
Processes:
turbinals.exepid Process 1888 turbinals.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2364-13-0x00000000008B0000-0x0000000000A88000-memory.dmp autoit_exe behavioral2/memory/1888-22-0x0000000000E80000-0x0000000001058000-memory.dmp autoit_exe -
Processes:
resource yara_rule behavioral2/memory/2364-0-0x00000000008B0000-0x0000000000A88000-memory.dmp upx behavioral2/files/0x000a000000023b89-10.dat upx behavioral2/memory/1888-11-0x0000000000E80000-0x0000000001058000-memory.dmp upx behavioral2/memory/2364-13-0x00000000008B0000-0x0000000000A88000-memory.dmp upx behavioral2/memory/1888-22-0x0000000000E80000-0x0000000001058000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
turbinals.exez49FACTURA-0987678.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language turbinals.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z49FACTURA-0987678.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
z49FACTURA-0987678.exeturbinals.exepid Process 2364 z49FACTURA-0987678.exe 2364 z49FACTURA-0987678.exe 1888 turbinals.exe 1888 turbinals.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
z49FACTURA-0987678.exeturbinals.exepid Process 2364 z49FACTURA-0987678.exe 2364 z49FACTURA-0987678.exe 1888 turbinals.exe 1888 turbinals.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
z49FACTURA-0987678.exedescription pid Process procid_target PID 2364 wrote to memory of 1888 2364 z49FACTURA-0987678.exe 83 PID 2364 wrote to memory of 1888 2364 z49FACTURA-0987678.exe 83 PID 2364 wrote to memory of 1888 2364 z49FACTURA-0987678.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\z49FACTURA-0987678.exe"C:\Users\Admin\AppData\Local\Temp\z49FACTURA-0987678.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\acceptancy\turbinals.exe"C:\Users\Admin\AppData\Local\Temp\z49FACTURA-0987678.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD56d0ab52be413621da05901cb1555c89a
SHA115a52d058c3f680822c6ffac5d988f39154ed021
SHA256c9cc9915a9a7041c1011658b68a2546747c2c522155e494d73bb0cf9043bd63d
SHA51220d0896bffd4d8cae1d9e6a15c7bc8efde49b727e1de2f1f218e773765c1459127b529215c3d30ac1d72b94a12af276708c9fb519aa1305521c1749711f14653
-
Filesize
481KB
MD51d91eeebb3b92b76f541713ef2bfd0ee
SHA105a109daafce3d39d6fb3b9e747614a1531f2890
SHA256206627c14f57b9b6ce47b972da9538c1fc4e941626b803abe5c852e54f309795
SHA512c55bc96b3de8722e89217116a8b6959857c1beb822bd95284789513b5ff88ca6ef4124156f7d212488249083505268cf68ce59da729dd3b7378b030c89e98489
-
Filesize
854KB
MD5876f47f33c5975497c15bf24d50952b5
SHA1a47579ea0e5d47ceb89cbb3450f4c482768a0bf8
SHA25649e8a1f12fb5202470604efe01c0d60949d20d302a76aed85b2a049e91266366
SHA5127346f82c0c7065d2de4ec5d5747235ce0ada6e799e6cf461a57ce15969ccd0bf92bf7d5efb2e5b57ad4be0defd3a716bdb6a8c609e0abbe0fb3832f5cfbfd6c3