Overview
overview
10Static
static
32f14fefdd7...81.exe
windows7-x64
102f14fefdd7...81.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...9b.dll
windows7-x64
10$PLUGINSDI...9b.dll
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
2f14fefdd76197ec0b0eed44f534230e1e2b39d655edf87dd8571ceb966bb281.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2f14fefdd76197ec0b0eed44f534230e1e2b39d655edf87dd8571ceb966bb281.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/gb7ir8nsaimu39b.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/gb7ir8nsaimu39b.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/gb7ir8nsaimu39b.dll
-
Size
149KB
-
MD5
0c44ee25d7c510783d118d3f76d88b3b
-
SHA1
ff537d185513d1a2daf91ca5679c79f3c8346e9a
-
SHA256
0b54c2abb6bee336adc1866f128591a6e0d5fa0f90333f6a6b57205b41196e20
-
SHA512
a13490eb75a842e15ae33cb167209e76dbfb7b1fe96530ca3bd41ff2a4318717b53a5e44bb1f0f2523f38888e142061019082ffb11bc633953a773b25e2fc587
-
SSDEEP
3072:zakbhW2I5O+aiKzEV6o7dkH6ChVLOSV49p6vfESJvAEVXUOQn3r+e2:zjbM2SwbUJ6HrLOHovfFNAE23r+e2
Malware Config
Extracted
remcos
2.7.2 Pro
GRACE _ MARCY
103.153.77.83:4348
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
mozila.exe
-
copy_folder
mozila
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
mozila
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
mozila-VR8Q9A
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
mozila
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Blocklisted process makes network request 7 IoCs
flow pid Process 2 3824 rundll32.exe 22 3824 rundll32.exe 36 3824 rundll32.exe 40 3824 rundll32.exe 41 3824 rundll32.exe 48 3824 rundll32.exe 49 3824 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4964 set thread context of 3824 4964 rundll32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4964 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3824 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4964 2052 rundll32.exe 83 PID 2052 wrote to memory of 4964 2052 rundll32.exe 83 PID 2052 wrote to memory of 4964 2052 rundll32.exe 83 PID 4964 wrote to memory of 3824 4964 rundll32.exe 84 PID 4964 wrote to memory of 3824 4964 rundll32.exe 84 PID 4964 wrote to memory of 3824 4964 rundll32.exe 84 PID 4964 wrote to memory of 3824 4964 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gb7ir8nsaimu39b.dll,#13⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD596c878ab9a95c2ff97d7d071f32a0ee5
SHA1eeccfd07686c3cffaa0a655ad6784cd318c37979
SHA256f5606acfdd771c19b5e58f5caebce4a3abac2450e37941960b76cefc2bfb19a3
SHA512a3c115f94f3d6ad8b5e53efc983a7948061238d14ecc1eb6228d377bee3784044804d4489774f7df62db36d9bdf0544d2287fe58d26125f22296fd831aac69be