Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
C3C8E7B07E16739C1C0B79F5FF91479F.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
C3C8E7B07E16739C1C0B79F5FF91479F.exe
Resource
win10v2004-20241007-en
General
-
Target
C3C8E7B07E16739C1C0B79F5FF91479F.exe
-
Size
5.2MB
-
MD5
c3c8e7b07e16739c1c0b79f5ff91479f
-
SHA1
5de5162c4f4c76a1fbcc281f26a02486f626f29a
-
SHA256
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87
-
SHA512
cef48c9be82f4db90c68443630d58084aae1aea054bca82803d51ab63226ca085e1c05b393505dd9442c832b1c59e6720ff217d61200ac9011159d145ac33ba4
-
SSDEEP
49152:/IFXei/uNQrNQDuNz6jk+1n+Vu1cJ+TsehmvK718uFvvPRSTp8UX6:/QN8DU6jn+V8/IeIA8u08UX6
Malware Config
Extracted
remcos
ROSAS
newstaticfreepoint24.ddns-ip.net:3020
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
data
-
mouse_option
false
-
mutex
kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userModel = "C:\\Users\\Admin\\Favorites\\my-web-app\\backend\\userModel.exe" C3C8E7B07E16739C1C0B79F5FF91479F.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C3C8E7B07E16739C1C0B79F5FF91479F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C3C8E7B07E16739C1C0B79F5FF91479F.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3180 C3C8E7B07E16739C1C0B79F5FF91479F.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3180 4812 C3C8E7B07E16739C1C0B79F5FF91479F.exe 85 PID 4812 wrote to memory of 3180 4812 C3C8E7B07E16739C1C0B79F5FF91479F.exe 85 PID 4812 wrote to memory of 3180 4812 C3C8E7B07E16739C1C0B79F5FF91479F.exe 85 PID 4812 wrote to memory of 3180 4812 C3C8E7B07E16739C1C0B79F5FF91479F.exe 85 PID 4812 wrote to memory of 3180 4812 C3C8E7B07E16739C1C0B79F5FF91479F.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"C:\Users\Admin\AppData\Local\Temp\C3C8E7B07E16739C1C0B79F5FF91479F.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5b1aa56e1069d0cac2f94ddcb3b0198ef
SHA1a571cf086a03822639ea7b33a2e7a0ccc43aa1b3
SHA25644cf8196280f027d2c7302892e2729c43c9e0f9cfa77435955dbd4153e7a5898
SHA5122f704a15ad9957d2f808771f703bfaf3584976b68cca81d42fc996c1d5291f4c4c3c0e8ae3cce67c073cb5b393dfb6e4af67d038649d3fe66ee5714e6b5d4469