Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACT PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CONTRACT PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
INVOICE 3 PDF.exe
Resource
win7-20240903-en
General
-
Target
CONTRACT PDF.exe
-
Size
1.3MB
-
MD5
aea6e429dd8151e74d29dfb36a13f55f
-
SHA1
01d7b201aa1e353696538b85b4a034dcf4b5ab7f
-
SHA256
17c9fb1651af031a1e7cba7f36b7de364695ee974cfaf784b3d63346b9dc34f4
-
SHA512
ee332daf7a6861b5d6edd29bd16f59c2b0337a8cc611892df2df025ac8120884d95d802c9eb0bf394f21944b2679e53d5b3edd17688badb56169e12ae1ff12f0
-
SSDEEP
24576:AH+rre+7KSXkLs5SbzuUDY/RvaIjiuTVKTCkszir:Z/h7K4SdzBDaJaIjiqQs
Malware Config
Extracted
remcos
RemoteHost
rambolastblood.ddns.net:6327
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
vlc.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
vlc-63SQWS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
vlc
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 1 IoCs
pid Process 2224 vlc.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\vlc\\vlc.exe\"" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 2572 2316 CONTRACT PDF.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CONTRACT PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 CONTRACT PDF.exe 2316 CONTRACT PDF.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2316 wrote to memory of 2572 2316 CONTRACT PDF.exe 31 PID 2572 wrote to memory of 1784 2572 RegSvcs.exe 32 PID 2572 wrote to memory of 1784 2572 RegSvcs.exe 32 PID 2572 wrote to memory of 1784 2572 RegSvcs.exe 32 PID 2572 wrote to memory of 1784 2572 RegSvcs.exe 32 PID 1784 wrote to memory of 2144 1784 WScript.exe 33 PID 1784 wrote to memory of 2144 1784 WScript.exe 33 PID 1784 wrote to memory of 2144 1784 WScript.exe 33 PID 1784 wrote to memory of 2144 1784 WScript.exe 33 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35 PID 2144 wrote to memory of 2224 2144 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\CONTRACT PDF.exe"C:\Users\Admin\AppData\Local\Temp\CONTRACT PDF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\vlc\vlc.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\vlc\vlc.exeC:\Users\Admin\AppData\Roaming\vlc\vlc.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD5f924776da3b9306135f258b408c9848b
SHA18d0a034351ad1d46ec0adb7ce2618e9d093f665f
SHA2564362971fecdd25739629706e784b22e9e12b67a0dc65a70f5d8896139655a3d9
SHA512cdaaef03ecb2728dbe964ecf04b1d70ea5a506e79ceabd1401bf3e4b4065cc478cc26bd454784d17fbee59878c63236303c0c63306170cb0cf33040a1d5f6ccb
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215