Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
C3C8E7B07E16739C1C0B79F5FF91479F.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
C3C8E7B07E16739C1C0B79F5FF91479F.exe
Resource
win10v2004-20241007-en
General
-
Target
C3C8E7B07E16739C1C0B79F5FF91479F.exe
-
Size
5.2MB
-
MD5
c3c8e7b07e16739c1c0b79f5ff91479f
-
SHA1
5de5162c4f4c76a1fbcc281f26a02486f626f29a
-
SHA256
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87
-
SHA512
cef48c9be82f4db90c68443630d58084aae1aea054bca82803d51ab63226ca085e1c05b393505dd9442c832b1c59e6720ff217d61200ac9011159d145ac33ba4
-
SSDEEP
49152:/IFXei/uNQrNQDuNz6jk+1n+Vu1cJ+TsehmvK718uFvvPRSTp8UX6:/QN8DU6jn+V8/IeIA8u08UX6
Malware Config
Extracted
remcos
ROSAS
newstaticfreepoint24.ddns-ip.net:3020
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
data
-
mouse_option
false
-
mutex
kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\userModel = "C:\\Users\\Admin\\Favorites\\my-web-app\\backend\\userModel.exe" C3C8E7B07E16739C1C0B79F5FF91479F.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C3C8E7B07E16739C1C0B79F5FF91479F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C3C8E7B07E16739C1C0B79F5FF91479F.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 C3C8E7B07E16739C1C0B79F5FF91479F.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30 PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30 PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30 PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30 PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30 PID 3056 wrote to memory of 2704 3056 C3C8E7B07E16739C1C0B79F5FF91479F.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5fcf653509983d9d7ebfaca77d20f963b
SHA1e9fc1dfd660061e4edb5eb2f2924e2d5f36ccfbb
SHA25637a7af72de949b42ed3663d075a3e98ea0fef928dcd782d543b482c646f27d31
SHA5121522c29eb7afd8899ccd7f6200b9aa3555322d0009f5873c23eee4725b910deacdaa2b65b6c6d2ae83b2e6321e09e6ed83172f7a4dd6163f0826ab689d90131e