Analysis
-
max time kernel
267s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
Order Inquiry Sample/Order Inquiry Sample.fdp.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Order Inquiry Sample/Order Inquiry Sample.fdp.exe
Resource
win10v2004-20241007-en
General
-
Target
Order Inquiry Sample/Order Inquiry Sample.fdp.exe
-
Size
1.4MB
-
MD5
4918286bab253571011dca91a94c7a9d
-
SHA1
df4f5740aa5c17a6bab7f7df761f4485847bb1b9
-
SHA256
1d2318e3dc389cff6b70d6fb54e36d3af39c4953e10593f4cbb446f58788966d
-
SHA512
92cc906208c8895669cfa826813c2613aaf2eeb823d3c2482e8a3eb35a2e7ece94ef65006ebeb0338fc1dbadf638c083defecc0f202308fc62549feb1b0a54b1
-
SSDEEP
24576:TwJXLIjOU0HsOzj4j85M1hUQDAxzJX4wwI:kJXcjcsOzj4jGM1aK4FX
Malware Config
Extracted
remcos
wire 17/12
teebro1800.dynamic-dns.net:2195
teewire.ydns.eu:2195
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CXQHPD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation teeeee.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation teee.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 4376 teeeee.exe 1748 teee.exe 1932 teee.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teeee = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\teee\\teeeee.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 4212 4376 teeeee.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teeeee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order Inquiry Sample.fdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1464 PING.EXE 2092 cmd.exe 1928 PING.EXE 4100 PING.EXE 100 cmd.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1464 PING.EXE 1928 PING.EXE 4100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 1520 Order Inquiry Sample.fdp.exe 4376 teeeee.exe 4376 teeeee.exe 4376 teeeee.exe 4376 teeeee.exe 1748 teee.exe 1932 teee.exe 1932 teee.exe 1932 teee.exe 4376 teeeee.exe 4376 teeeee.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 Order Inquiry Sample.fdp.exe Token: SeDebugPrivilege 4376 teeeee.exe Token: SeDebugPrivilege 1748 teee.exe Token: SeDebugPrivilege 1932 teee.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1520 wrote to memory of 100 1520 Order Inquiry Sample.fdp.exe 83 PID 1520 wrote to memory of 100 1520 Order Inquiry Sample.fdp.exe 83 PID 1520 wrote to memory of 100 1520 Order Inquiry Sample.fdp.exe 83 PID 100 wrote to memory of 1464 100 cmd.exe 85 PID 100 wrote to memory of 1464 100 cmd.exe 85 PID 100 wrote to memory of 1464 100 cmd.exe 85 PID 1520 wrote to memory of 2092 1520 Order Inquiry Sample.fdp.exe 101 PID 1520 wrote to memory of 2092 1520 Order Inquiry Sample.fdp.exe 101 PID 1520 wrote to memory of 2092 1520 Order Inquiry Sample.fdp.exe 101 PID 2092 wrote to memory of 1928 2092 cmd.exe 103 PID 2092 wrote to memory of 1928 2092 cmd.exe 103 PID 2092 wrote to memory of 1928 2092 cmd.exe 103 PID 100 wrote to memory of 4072 100 cmd.exe 104 PID 100 wrote to memory of 4072 100 cmd.exe 104 PID 100 wrote to memory of 4072 100 cmd.exe 104 PID 2092 wrote to memory of 4100 2092 cmd.exe 108 PID 2092 wrote to memory of 4100 2092 cmd.exe 108 PID 2092 wrote to memory of 4100 2092 cmd.exe 108 PID 2092 wrote to memory of 4376 2092 cmd.exe 109 PID 2092 wrote to memory of 4376 2092 cmd.exe 109 PID 2092 wrote to memory of 4376 2092 cmd.exe 109 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 4212 4376 teeeee.exe 110 PID 4376 wrote to memory of 1748 4376 teeeee.exe 112 PID 4376 wrote to memory of 1748 4376 teeeee.exe 112 PID 4376 wrote to memory of 1748 4376 teeeee.exe 112 PID 1748 wrote to memory of 1932 1748 teee.exe 113 PID 1748 wrote to memory of 1932 1748 teee.exe 113 PID 1748 wrote to memory of 1932 1748 teee.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry Sample\Order Inquiry Sample.fdp.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry Sample\Order Inquiry Sample.fdp.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 38 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "teeee" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 383⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1464
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "teeee" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 40 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Order Inquiry Sample\Order Inquiry Sample.fdp.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe" && ping 127.0.0.1 -n 40 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 403⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1928
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 403⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4100
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teee\teeeee.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\teee.exe"C:\Users\Admin\AppData\Local\Temp\teee.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\teee.exe"C:\Users\Admin\AppData\Local\Temp\teee.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
103B
MD562c3495a16adb867915d37b7f0c4e87e
SHA19fd0f9b8bd327686a2500ddfd883ed779d688fa8
SHA256ae04c36f98ad50376a16df6435ff701a3b5b372bbf54425f35ff7dcdebee3901
SHA512ea5d317f04368fdd9b012b95102979f47a57b42777f366de29c7efde75e85feaeeb99beabf24b44e6c4a84e6663fda94e45b2742512badc6e39e3c1933cd3c00
-
Filesize
106B
MD5b17f994a19fbf4cba98a329a658586b0
SHA1f13d7cf2612f97a3fc74265c2e06deeba4b14d06
SHA256970a3adfa2aa4e276efb9580bb05eeb78e9eaaaf4a3ba7b5c4e2871865698527
SHA51260cc0447cb06f8bedacb42d17cc776579a1fcb7942e10f7abf08bb559fa5a677ac7807b20e8cc91d93f9a6ef8efe521798e0f86148698e0544f8ccf8cddfd905
-
Filesize
106B
MD5989faa465d743c2809c3221797b2854d
SHA1538a10595cd4572243c646ebfe1eb3a60913eddb
SHA2562ea791874bb715f21fd9b1accdf2bbf705b26f5cbb58df8eede67eac062c069e
SHA5124bd763b8c03728e8e74cc98d00f0d7d643c8ba931b90515911670c108da38ebbf7f32037e0db7924c2b26fe88bd0a3b9a0e73db00edf7f62c66fac39961f2f87
-
Filesize
1.4MB
MD54918286bab253571011dca91a94c7a9d
SHA1df4f5740aa5c17a6bab7f7df761f4485847bb1b9
SHA2561d2318e3dc389cff6b70d6fb54e36d3af39c4953e10593f4cbb446f58788966d
SHA51292cc906208c8895669cfa826813c2613aaf2eeb823d3c2482e8a3eb35a2e7ece94ef65006ebeb0338fc1dbadf638c083defecc0f202308fc62549feb1b0a54b1