Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 02:07
Behavioral task
behavioral1
Sample
28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe
Resource
win10v2004-20241007-en
General
-
Target
28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe
-
Size
865KB
-
MD5
6f0604f8a16b94b61d714dfec11d0358
-
SHA1
558828c2ead68ea5883655299a3f0bfad1981ae5
-
SHA256
28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281
-
SHA512
76ebd74ec7b965ff20aad25aa6c0dfc5b7efef087f6bd4bf6f0b2f08427ac65bf320305db16ff00cebc5bfc98c8f22014ed5e7c9cedd37a05721b330326c4eb3
-
SSDEEP
24576:drl6kD68JmlotQfAVnxag+/zxRlk4t4p5G5wJm1wr:Zl328U2yfAVnsgSWpg5km
Malware Config
Extracted
remcos
RemoteHost
192.210.150.26:8787
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R1T905
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Allene.vbs Allene.exe -
Executes dropped EXE 1 IoCs
pid Process 4180 Allene.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5060-14-0x0000000000A80000-0x0000000000C5D000-memory.dmp autoit_exe behavioral2/memory/4180-35-0x00000000009D0000-0x0000000000BAD000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/5060-0-0x0000000000A80000-0x0000000000C5D000-memory.dmp upx behavioral2/files/0x0007000000023c99-10.dat upx behavioral2/memory/4180-11-0x00000000009D0000-0x0000000000BAD000-memory.dmp upx behavioral2/memory/5060-14-0x0000000000A80000-0x0000000000C5D000-memory.dmp upx behavioral2/memory/4180-35-0x00000000009D0000-0x0000000000BAD000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Allene.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 4180 Allene.exe 4180 Allene.exe 4180 Allene.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 4180 Allene.exe 4180 Allene.exe 4180 Allene.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4180 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 82 PID 5060 wrote to memory of 4180 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 82 PID 5060 wrote to memory of 4180 5060 28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe"C:\Users\Admin\AppData\Local\Temp\28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Milburr\Allene.exe"C:\Users\Admin\AppData\Local\Temp\28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD583aedb27a748c0a12c083568113419d3
SHA16c4f1068591f9f5021552dddea5648a60c3047f7
SHA256aae9e6db3ce6841aeac2160aa9195d8d46744cbd7f966147da32baa29374341f
SHA51239e45d7049daf712af161915eb7317b3e151c60d86ecba18c0cb106786e4994c5f1c8b6d4df3a97d91f8d77885d6180b8dc2e6c6a0fe92ac01891a777dc193b0
-
Filesize
865KB
MD56f0604f8a16b94b61d714dfec11d0358
SHA1558828c2ead68ea5883655299a3f0bfad1981ae5
SHA25628331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281
SHA51276ebd74ec7b965ff20aad25aa6c0dfc5b7efef087f6bd4bf6f0b2f08427ac65bf320305db16ff00cebc5bfc98c8f22014ed5e7c9cedd37a05721b330326c4eb3