Overview
overview
10Static
static
32f14fefdd7...81.exe
windows7-x64
102f14fefdd7...81.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...9b.dll
windows7-x64
10$PLUGINSDI...9b.dll
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
2f14fefdd76197ec0b0eed44f534230e1e2b39d655edf87dd8571ceb966bb281.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2f14fefdd76197ec0b0eed44f534230e1e2b39d655edf87dd8571ceb966bb281.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/gb7ir8nsaimu39b.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/gb7ir8nsaimu39b.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/gb7ir8nsaimu39b.dll
-
Size
149KB
-
MD5
0c44ee25d7c510783d118d3f76d88b3b
-
SHA1
ff537d185513d1a2daf91ca5679c79f3c8346e9a
-
SHA256
0b54c2abb6bee336adc1866f128591a6e0d5fa0f90333f6a6b57205b41196e20
-
SHA512
a13490eb75a842e15ae33cb167209e76dbfb7b1fe96530ca3bd41ff2a4318717b53a5e44bb1f0f2523f38888e142061019082ffb11bc633953a773b25e2fc587
-
SSDEEP
3072:zakbhW2I5O+aiKzEV6o7dkH6ChVLOSV49p6vfESJvAEVXUOQn3r+e2:zjbM2SwbUJ6HrLOHovfFNAE23r+e2
Malware Config
Extracted
remcos
2.7.2 Pro
GRACE _ MARCY
103.153.77.83:4348
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
mozila.exe
-
copy_folder
mozila
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
mozila
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
mozila-VR8Q9A
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
mozila
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Blocklisted process makes network request 7 IoCs
flow pid Process 2 3020 rundll32.exe 5 3020 rundll32.exe 6 3020 rundll32.exe 7 3020 rundll32.exe 8 3020 rundll32.exe 9 3020 rundll32.exe 10 3020 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 3020 2060 rundll32.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1072 2060 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2060 rundll32.exe 2060 rundll32.exe 2060 rundll32.exe 2060 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2060 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2284 wrote to memory of 2060 2284 rundll32.exe 28 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 3020 2060 rundll32.exe 29 PID 2060 wrote to memory of 1072 2060 rundll32.exe 30 PID 2060 wrote to memory of 1072 2060 rundll32.exe 30 PID 2060 wrote to memory of 1072 2060 rundll32.exe 30 PID 2060 wrote to memory of 1072 2060 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#13⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 3123⤵
- Program crash
PID:1072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD57731765a845bfb7324ca2a92061213b8
SHA1401f6d6ed76eaafef1d42db809db991a1de21374
SHA256e4e3469d85d9453808927bcc408b2d1f7f655c53e8a574beb62989615bf731c0
SHA512d7f2cd634d161dedd4d0d46eac483f9ef70e54420d4a625981c5b8c1660a727bc0d8685e2ee9dd1c684589a269ab1734341df6c8afa76298a61259b842ad2510