Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
InspectorNvidiaPro-64.exe
Resource
win7-20240729-en
General
-
Target
InspectorNvidiaPro-64.exe
-
Size
1.6MB
-
MD5
912c89ac3e4ab699bd11cd2fc5da0bb2
-
SHA1
cd1499b70f084dca31343adb170fe3f618bd5933
-
SHA256
01f24017584c20793bdb7a066a1054b4474310ccda8ddd19a9521aa7cb0708ba
-
SHA512
b7fcf3222e862afae298ab32ba82be3fa90b01fc04f66c3a4e6b2b9e1f6556e15be9b8f331b0f466dcd1be127d14d2fa0ad711bcea46e0485454a53642c74ccd
-
SSDEEP
24576:j7FUDowAyrTVE3U5FEimXsOKK56BCObsE6UtoZmUd2N6xSIJQRn+KAXu:jBuZrEUzmXb0CUj1Ud2sMnNJ
Malware Config
Extracted
remcos
5003
92.255.85.63:5003
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7Z8WNB
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 5 IoCs
pid Process 1496 InspectorNvidiaPro-64.tmp 2832 InspectorNvidiaPro-64.tmp 2968 nvidiaInspector.exe 1364 IDRService.exe 1544 IDRService.exe -
Loads dropped DLL 12 IoCs
pid Process 1456 InspectorNvidiaPro-64.exe 1496 InspectorNvidiaPro-64.tmp 2248 InspectorNvidiaPro-64.exe 2832 InspectorNvidiaPro-64.tmp 2832 InspectorNvidiaPro-64.tmp 2832 InspectorNvidiaPro-64.tmp 1364 IDRService.exe 1364 IDRService.exe 1364 IDRService.exe 1544 IDRService.exe 1544 IDRService.exe 2068 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1544 set thread context of 2068 1544 IDRService.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDRService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InspectorNvidiaPro-64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InspectorNvidiaPro-64.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InspectorNvidiaPro-64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InspectorNvidiaPro-64.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDRService.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2832 InspectorNvidiaPro-64.tmp 2832 InspectorNvidiaPro-64.tmp 1364 IDRService.exe 1544 IDRService.exe 1544 IDRService.exe 2068 cmd.exe 2068 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1544 IDRService.exe 2068 cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 InspectorNvidiaPro-64.tmp -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1456 wrote to memory of 1496 1456 InspectorNvidiaPro-64.exe 29 PID 1496 wrote to memory of 2248 1496 InspectorNvidiaPro-64.tmp 30 PID 1496 wrote to memory of 2248 1496 InspectorNvidiaPro-64.tmp 30 PID 1496 wrote to memory of 2248 1496 InspectorNvidiaPro-64.tmp 30 PID 1496 wrote to memory of 2248 1496 InspectorNvidiaPro-64.tmp 30 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2248 wrote to memory of 2832 2248 InspectorNvidiaPro-64.exe 31 PID 2832 wrote to memory of 2968 2832 InspectorNvidiaPro-64.tmp 32 PID 2832 wrote to memory of 2968 2832 InspectorNvidiaPro-64.tmp 32 PID 2832 wrote to memory of 2968 2832 InspectorNvidiaPro-64.tmp 32 PID 2832 wrote to memory of 2968 2832 InspectorNvidiaPro-64.tmp 32 PID 2832 wrote to memory of 1364 2832 InspectorNvidiaPro-64.tmp 34 PID 2832 wrote to memory of 1364 2832 InspectorNvidiaPro-64.tmp 34 PID 2832 wrote to memory of 1364 2832 InspectorNvidiaPro-64.tmp 34 PID 2832 wrote to memory of 1364 2832 InspectorNvidiaPro-64.tmp 34 PID 1364 wrote to memory of 1544 1364 IDRService.exe 35 PID 1364 wrote to memory of 1544 1364 IDRService.exe 35 PID 1364 wrote to memory of 1544 1364 IDRService.exe 35 PID 1364 wrote to memory of 1544 1364 IDRService.exe 35 PID 1544 wrote to memory of 2068 1544 IDRService.exe 36 PID 1544 wrote to memory of 2068 1544 IDRService.exe 36 PID 1544 wrote to memory of 2068 1544 IDRService.exe 36 PID 1544 wrote to memory of 2068 1544 IDRService.exe 36 PID 1544 wrote to memory of 2068 1544 IDRService.exe 36 PID 2068 wrote to memory of 2072 2068 cmd.exe 38 PID 2068 wrote to memory of 2072 2068 cmd.exe 38 PID 2068 wrote to memory of 2072 2068 cmd.exe 38 PID 2068 wrote to memory of 2072 2068 cmd.exe 38 PID 2068 wrote to memory of 2072 2068 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe"C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\is-D1DQD.tmp\InspectorNvidiaPro-64.tmp"C:\Users\Admin\AppData\Local\Temp\is-D1DQD.tmp\InspectorNvidiaPro-64.tmp" /SL5="$40216,791552,0,C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe"C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe" /VERYSILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\is-5URSB.tmp\InspectorNvidiaPro-64.tmp"C:\Users\Admin\AppData\Local\Temp\is-5URSB.tmp\InspectorNvidiaPro-64.tmp" /SL5="$50216,791552,0,C:\Users\Admin\AppData\Local\Temp\InspectorNvidiaPro-64.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\nvidiaInspector.exe"C:\Users\Admin\AppData\Roaming\nvidiaInspector.exe"5⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\IDRService.exe"C:\Users\Admin\AppData\Roaming\IDRService.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\KO_Power\IDRService.exeC:\Users\Admin\AppData\Roaming\KO_Power\IDRService.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54ee76b1aecabfd690814afd3411e1f22
SHA1350dae69bcdcf5787b3bc71fcb5c4341fa730654
SHA256a10020719ab6e3dc27da9227daca82e48e6697c94a114fddebadf66499d103a0
SHA5126de55a025838cee306754dc4bd65b3f54f7485925cb48ce71dae1161c03c5270e706a4b554f9c79d914e786fe9d236c66e9f4a8f576163ee3db0bc5d30b5ac49
-
Filesize
1.6MB
MD5ec539c4a9c60b3690fbd891e19333362
SHA17cd141b72d9c6701c27f939b790624ebe04668fd
SHA2561d60149ce640f4e07bceeb8940950441025277f1eba4f501f8afe558030b34fe
SHA512b6a3496e7b6f7aed5dcc7e0bb3fe903d2c231ff5470bbedd37e8bea83b1951dc835f32ac6508dea8b561bfd6354e7741227a42eb49fc0575ce64e12b494c00c1
-
Filesize
947KB
MD577a94cd64437ca28cdbb889864900dfe
SHA1430575f9c462aceed520494ec5fb2087d999d420
SHA25682823bd91c34e24b0b225075f0f69f9d2313e58df01862bccd3fcfbf5ae36733
SHA512627b67ba09d7e25a7207b69630d3a1b2c5c2c3f93e47644ef61e057f8a0f68c62051a6cb75c05c8acd728b8122fd27e8529265635def1ac70a9290af65c8476f
-
Filesize
16KB
MD5b613ff11758faed863380d6a1e3abac0
SHA1959fc450422dca5babbe1ef395f68e93724a4616
SHA256120e44ed51661e0e86dc8c92cb78a6869192e4331376d7d62fe8287eb340215e
SHA512cd1bdec448913f173f8204eaedbe862bbe7380480c3c629d88bfb1ef254ca9cbc191b8ee8a41c0648565a7429436bad698d06b9ed06a221ce0a85c9a2215f5c9
-
Filesize
3.0MB
MD52ef50af4f6fbe0a32630f748382dfa1c
SHA188dd765da4dc6a867e3a81eb1bbc53cc1729ae98
SHA256353f635294d95ba4a4fdfa10222aea50a085007003a9156ee7f50c0295b56b77
SHA512d6f25178299b5a7f354dbb46a8cff0233ece08479e5b4fe05a31613597757813962fb1700509ec2d6264158c2b94ecb51a876a0d8009f01992f6c40db0e08890
-
Filesize
34KB
MD5c6ae924ad02500284f7e4efa11fa7cfc
SHA12a7770b473b0a7dc9a331d017297ff5af400fed8
SHA25631d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26
SHA512f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae
-
Filesize
59KB
MD592b8cc6f16f9455446cbf1d748a2a30f
SHA1d0a2700230bd4f095d02ed0f533b3687b3e36767
SHA2561a0bf6db185254e352e6bf47b9d86986cb9191339390e3b5f638b962d433d22c
SHA512023a642123b3e056092b6550f14f2f6feaa9c5c6c3e2343732e4bee791946795df12bcdbcffb67e99eb5c1746e564be356b426aefb014190e6e0d3c72c671784
-
Filesize
484KB
MD583c9984b29ee1f908b45a963cfb8adea
SHA1bd20801c13ae2e9b7d6ee1b8835615d921f057eb
SHA2564128026b5a096ee35198fa18db1f6c6d27a81096aac48bc86803e5ad8a2dea7a
SHA512d3f388eac1eaf0ea4f723cf9a5f8defbe8d43d0082216d591fdff81e2bbc4fdf1ff16acbc5c45120d15edacca3058ff2ab9aa3be43f5e4daeb7764cfba9d93e7
-
Filesize
904KB
MD59d255e04106ba7dcbd0bcb549e9a5a4e
SHA1a9becb85b181c37ee5a940e149754c1912a901f1
SHA25602f37a8e3d1790ac90c04bc50de73cd1a93e27caf833a1e1211b9cc6294ecee5
SHA51254c54787a4ca8643271169be403069bc5f1e319a55d6a0ebd84fb0d96f6e9bddc52b0908541d29db04a042b531abd6c05073e27b0b2753196e0055b8b8200b09