Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
Resource
win10v2004-20241007-en
General
-
Target
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe
-
Size
140KB
-
MD5
30f7acc51821a12ab4eb1cd9a0dcff94
-
SHA1
06d744b9f8982e4b36896f38f75463100f644bda
-
SHA256
b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3
-
SHA512
e601feee4fb460ce512ff232f397a003024fdd11c06ecd4181e48c70d1addb13bd969ddb19295aaed2883614bd3eb43546ffa516367eb522cdd2e4baf785c760
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVS7:xP6/M+WLckOBhVmIYI
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2868 wn2ra4ohzdr.exe 2656 wn2ra4ohzdr.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2656 2868 wn2ra4ohzdr.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2868 1700 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 30 PID 1700 wrote to memory of 2868 1700 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 30 PID 1700 wrote to memory of 2868 1700 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 30 PID 1700 wrote to memory of 2868 1700 b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe 30 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31 PID 2868 wrote to memory of 2656 2868 wn2ra4ohzdr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe"C:\Users\Admin\AppData\Local\Temp\b49d3ac4c38b436445299032a532e2f3de973e1662a12b526ea8aa074d5bbff3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD584ca117057d5f8028fe181c58dd45251
SHA10649bf45a92b92de8121bca3df9bd5878ff04b42
SHA2563d93eb4c18de528957377a7255607e7a52df802cd4b4c774bb83ecb780a3101b
SHA512121ac597cb380185123ba33f1783a4c152bac578bdbc088b38463df3cdfe29e78c2f219729fd869ac6986a077dd907770f2841696ce20fe44ed49802817a8cd7