Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
Receipt-#202431029B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Receipt-#202431029B3.exe
Resource
win10v2004-20241007-en
General
-
Target
Receipt-#202431029B3.exe
-
Size
1.2MB
-
MD5
152c7485cbeb3bc280d028e065891d6e
-
SHA1
0ddffbb675b4569217ea960b288da13a67801983
-
SHA256
1420ee82c4ec66f06a832f01c43b0aca270fa9990f82f23fb36b899cabe11590
-
SHA512
1dc27627c964b8d39251833e4a97b3c51b334fd9cdc132094082a1ac4cae4a6d97258e04e9b87de929c18340d4af53768fa99469085db777bafb59559b1208b3
-
SSDEEP
24576:dMZMXvpjs+e2azR9jSca2PEt2kWT3GJqhDYRoPd+pT2A:AMfpjs+b2PEfYY+PspT2A
Malware Config
Extracted
remcos
RemoteHost
172.245.244.69:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
JavaRuntime.exe
-
copy_folder
Java
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-I0P1F7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
JavaRuntime
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1440 powershell.exe 764 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 JavaRuntime.exe 600 JavaRuntime.exe -
Loads dropped DLL 1 IoCs
pid Process 1604 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaRuntime = "\"C:\\ProgramData\\Java\\JavaRuntime.exe\"" Receipt-#202431029B3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\JavaRuntime = "\"C:\\ProgramData\\Java\\JavaRuntime.exe\"" JavaRuntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaRuntime = "\"C:\\ProgramData\\Java\\JavaRuntime.exe\"" JavaRuntime.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\JavaRuntime = "\"C:\\ProgramData\\Java\\JavaRuntime.exe\"" Receipt-#202431029B3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2488 set thread context of 2360 2488 Receipt-#202431029B3.exe 35 PID 2312 set thread context of 600 2312 JavaRuntime.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaRuntime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaRuntime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Receipt-#202431029B3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Receipt-#202431029B3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe 852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1440 powershell.exe 764 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 764 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 600 JavaRuntime.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1440 2488 Receipt-#202431029B3.exe 31 PID 2488 wrote to memory of 1440 2488 Receipt-#202431029B3.exe 31 PID 2488 wrote to memory of 1440 2488 Receipt-#202431029B3.exe 31 PID 2488 wrote to memory of 1440 2488 Receipt-#202431029B3.exe 31 PID 2488 wrote to memory of 2768 2488 Receipt-#202431029B3.exe 33 PID 2488 wrote to memory of 2768 2488 Receipt-#202431029B3.exe 33 PID 2488 wrote to memory of 2768 2488 Receipt-#202431029B3.exe 33 PID 2488 wrote to memory of 2768 2488 Receipt-#202431029B3.exe 33 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2488 wrote to memory of 2360 2488 Receipt-#202431029B3.exe 35 PID 2360 wrote to memory of 2552 2360 Receipt-#202431029B3.exe 36 PID 2360 wrote to memory of 2552 2360 Receipt-#202431029B3.exe 36 PID 2360 wrote to memory of 2552 2360 Receipt-#202431029B3.exe 36 PID 2360 wrote to memory of 2552 2360 Receipt-#202431029B3.exe 36 PID 2552 wrote to memory of 1604 2552 WScript.exe 37 PID 2552 wrote to memory of 1604 2552 WScript.exe 37 PID 2552 wrote to memory of 1604 2552 WScript.exe 37 PID 2552 wrote to memory of 1604 2552 WScript.exe 37 PID 1604 wrote to memory of 2312 1604 cmd.exe 39 PID 1604 wrote to memory of 2312 1604 cmd.exe 39 PID 1604 wrote to memory of 2312 1604 cmd.exe 39 PID 1604 wrote to memory of 2312 1604 cmd.exe 39 PID 2312 wrote to memory of 764 2312 JavaRuntime.exe 40 PID 2312 wrote to memory of 764 2312 JavaRuntime.exe 40 PID 2312 wrote to memory of 764 2312 JavaRuntime.exe 40 PID 2312 wrote to memory of 764 2312 JavaRuntime.exe 40 PID 2312 wrote to memory of 852 2312 JavaRuntime.exe 42 PID 2312 wrote to memory of 852 2312 JavaRuntime.exe 42 PID 2312 wrote to memory of 852 2312 JavaRuntime.exe 42 PID 2312 wrote to memory of 852 2312 JavaRuntime.exe 42 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44 PID 2312 wrote to memory of 600 2312 JavaRuntime.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt-#202431029B3.exe"C:\Users\Admin\AppData\Local\Temp\Receipt-#202431029B3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EtEJXD.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EtEJXD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1D50.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\Receipt-#202431029B3.exe"C:\Users\Admin\AppData\Local\Temp\Receipt-#202431029B3.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Java\JavaRuntime.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\ProgramData\Java\JavaRuntime.exeC:\ProgramData\Java\JavaRuntime.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EtEJXD.exe"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EtEJXD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5F7E.tmp"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:852
-
-
C:\ProgramData\Java\JavaRuntime.exe"C:\ProgramData\Java\JavaRuntime.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:600
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5152c7485cbeb3bc280d028e065891d6e
SHA10ddffbb675b4569217ea960b288da13a67801983
SHA2561420ee82c4ec66f06a832f01c43b0aca270fa9990f82f23fb36b899cabe11590
SHA5121dc27627c964b8d39251833e4a97b3c51b334fd9cdc132094082a1ac4cae4a6d97258e04e9b87de929c18340d4af53768fa99469085db777bafb59559b1208b3
-
Filesize
144B
MD5de91fdbfabaac3cf3fc31128b54b8089
SHA1b1e34e0925518efbfcf0d96cbda206addaa6273f
SHA256c52d415b688dbc923df45070bea56c3df754785e8cb694df9850f4726414e758
SHA512d277e782106810407d27da9882ea5d52ddd61c1b0099d956329fd71d0b8f7adcbf696b5de7e69bdc430ca2d4282d87cbe96439f32059d9f213db67e2133314cb
-
Filesize
392B
MD57935d3c5851b7744eaf93d733908c25c
SHA1d4eea4f1943a84663fa887cea509f2527dc04e49
SHA256bced2446ec2ee988dd2060e4a02be9b7413485da23be0be4e34934827518cb42
SHA51225556efb93a58d6ba43345c1e5f39ba642a90fc1c051c3094e0e70b79d4a9d31221f1f1d9c6b03c59e852cf6a7a27ee2ce8124d885e14dd5ccca89062f0943cc
-
Filesize
1KB
MD5b842d3f18159091ce830fbc303461c66
SHA10d27b705191b655e88e875dc94b834f1950bd3a4
SHA25619f217b1abcecf44e8baa670a97069c02d51d3559ab4ca00a9bec12c24c337f2
SHA512e7258b3ade935389a4f6dbbb1f1bef91866e9ad2bfdee38b180b43e3077abcd6c869cc05a0dac0a074128732e31483e75aa9c8995dd4c15d5c663be1062640db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fc49d25e902a5b7b8f99408b811db37d
SHA1b01e86a5458b50a2e3bad49daaa444ae27f9f9c1
SHA2564be52ec72ccac1f7404829530aecd3ec75bd81596e3cae9cd2d3548188e37b51
SHA51242ab9bac73e6f377c46a41c61c3bd9dc8248daa29d396590c2483a1a6dacca4705082103018a977f0fde00db741716a81c3729dae705a9b13fbaf4a247cb43ba