Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe
Resource
win10v2004-20241007-en
General
-
Target
7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe
-
Size
455KB
-
MD5
60e18d4606431a33c406c1ad21ddc4e2
-
SHA1
f8e773f104fcfd6df48ee21591ce8890fd8942c5
-
SHA256
7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee
-
SHA512
00c74a249be8ac164be201161aceb35e272f007e65ea6d740043ba89a55a69b7a01283d50fd446e774df05f869d9d6418f8d82fff5422133a36bebc2f8faf22e
-
SSDEEP
6144:sPm7KDoBlJL4vhsEAC7rWzLKmVn4RIM0EeNXWizh/Kkc6k4qHVWO1XO/gvJ/j:IELksjq0KmFbEeJN1Kkc6xqHVlVj
Malware Config
Extracted
remcos
Yavakosa
198.23.227.212:32583
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
yava_vd.exe
-
copy_folder
yava
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-D7NPY6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe -
Executes dropped EXE 1 IoCs
pid Process 1588 yava_vd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-D7NPY6 = "\"C:\\Users\\Admin\\AppData\\Roaming\\yava\\yava_vd.exe\"" 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-D7NPY6 = "\"C:\\Users\\Admin\\AppData\\Roaming\\yava\\yava_vd.exe\"" yava_vd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
pid pid_target Process procid_target 3736 2652 WerFault.exe 81 2248 2652 WerFault.exe 81 1984 2652 WerFault.exe 81 348 2652 WerFault.exe 81 1936 2652 WerFault.exe 81 1456 2652 WerFault.exe 81 3780 2652 WerFault.exe 81 5000 1588 WerFault.exe 95 4200 1588 WerFault.exe 95 4836 1588 WerFault.exe 95 3564 1588 WerFault.exe 95 2732 1588 WerFault.exe 95 4564 1588 WerFault.exe 95 5020 1588 WerFault.exe 95 3944 1588 WerFault.exe 95 2912 1588 WerFault.exe 95 1660 1588 WerFault.exe 95 1668 1588 WerFault.exe 95 2456 1588 WerFault.exe 95 1904 1588 WerFault.exe 95 2748 1588 WerFault.exe 95 2692 1588 WerFault.exe 95 2728 1588 WerFault.exe 95 1924 1588 WerFault.exe 95 4732 1588 WerFault.exe 95 4536 1588 WerFault.exe 95 4036 1588 WerFault.exe 95 4912 1588 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yava_vd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1588 2652 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe 95 PID 2652 wrote to memory of 1588 2652 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe 95 PID 2652 wrote to memory of 1588 2652 7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe"C:\Users\Admin\AppData\Local\Temp\7fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 9962⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 9962⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 11842⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 10002⤵
- Program crash
PID:348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 12042⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 11722⤵
- Program crash
PID:1456
-
-
C:\Users\Admin\AppData\Roaming\yava\yava_vd.exe"C:\Users\Admin\AppData\Roaming\yava\yava_vd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 6843⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7123⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7403⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7763⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 7923⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9483⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9883⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9883⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9483⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 10883⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 13043⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 8003⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 14523⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 12843⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 14603⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 12683⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 12563⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 12843⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 14123⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 12843⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 9443⤵
- Program crash
PID:4912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 12402⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2652 -ip 26521⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2652 -ip 26521⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2652 -ip 26521⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2652 -ip 26521⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2652 -ip 26521⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2652 -ip 26521⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2652 -ip 26521⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1588 -ip 15881⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1588 -ip 15881⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1588 -ip 15881⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1588 -ip 15881⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1588 -ip 15881⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1588 -ip 15881⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1588 -ip 15881⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1588 -ip 15881⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1588 -ip 15881⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1588 -ip 15881⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1588 -ip 15881⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1588 -ip 15881⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1588 -ip 15881⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1588 -ip 15881⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1588 -ip 15881⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1588 -ip 15881⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1588 -ip 15881⤵PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1588 -ip 15881⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1588 -ip 15881⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1588 -ip 15881⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1588 -ip 15881⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD560e18d4606431a33c406c1ad21ddc4e2
SHA1f8e773f104fcfd6df48ee21591ce8890fd8942c5
SHA2567fce076ae6458c561dcb1e5cd6a1de47aa114d5758dc791f0a94402ac4a9f2ee
SHA51200c74a249be8ac164be201161aceb35e272f007e65ea6d740043ba89a55a69b7a01283d50fd446e774df05f869d9d6418f8d82fff5422133a36bebc2f8faf22e