Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe
Resource
win10v2004-20241007-en
General
-
Target
88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe
-
Size
140KB
-
MD5
26ef5428d0ca17146002a3cea5b96810
-
SHA1
c2e9289ff3932e602884ce4d1f03f0fde8c2e67a
-
SHA256
88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73c
-
SHA512
795bdcb328f09ff8c1f5f2934fd104c8865f1ac744bac01d988def996ce7a521139d8a686bb7bd8f6ceda74891ab560c96b86d09f0fc62ca6f98d003b0758c77
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVSJ:xP6/M+WLckOBhVmIYI
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe -
Executes dropped EXE 2 IoCs
pid Process 4476 wn2ra4ohzdr.exe 1716 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4476 set thread context of 1716 4476 wn2ra4ohzdr.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4476 2372 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe 86 PID 2372 wrote to memory of 4476 2372 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe 86 PID 2372 wrote to memory of 4476 2372 88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe 86 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96 PID 4476 wrote to memory of 1716 4476 wn2ra4ohzdr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe"C:\Users\Admin\AppData\Local\Temp\88586521287a64331eb275b700110ff4fae5884e8a62655fe88cae71d59cb73cN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD547c7042d1220c258a5e66f62db86385f
SHA14b5a8a5c6eb043778f3dcdfe3e885a948e7be198
SHA2566f7b2624465dc721ceb1b37d0c4da6da1d1706f2a4350d485cccf8bf9c2f9bfc
SHA5128fb55fe9b9fd5f6bc04555fc9afc0d09ffceee4e80358873c360818515cdd162787f403e4af9712169737d46561822ecc0b5a9bb0232689dbdf90bb89cfd89f6