Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:32
Behavioral task
behavioral1
Sample
e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe
Resource
win7-20240903-en
General
-
Target
e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe
-
Size
2.9MB
-
MD5
c91f1586bb4bc9ea0953cdd3a7545227
-
SHA1
9fc644188b50deb00f77c0e9e0d78482e2a0619d
-
SHA256
e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd
-
SHA512
044982c08afdc7c74fa59e1710f6e2697abe4985a4a8c8e6ec1dc5eb108d7758f04be26c158fb118f6f0866005fb4eb54b5f7b3d4844c351bc31d9f82f05e66e
-
SSDEEP
49152:1HDpYiPDPHKf7Z0ek8jbq2Qg0Bk3JDSr0A8F1EdJv9XTZD9En/tdklpv:1HtRPzHKf90ek8jbvx0Bk3JDK21E5XtT
Malware Config
Extracted
remcos
RH1
185.29.9.125:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
itunes.exe
-
copy_folder
RMS
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Jd1985-XODZWD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Rms
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ itunes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion itunes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion itunes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Deletes itself 1 IoCs
pid Process 2304 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 itunes.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 cmd.exe 2828 cmd.exe -
resource yara_rule behavioral1/memory/2384-0-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-4-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-2-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-3-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-5-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-7-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-6-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/memory/2384-13-0x0000000000EF0000-0x0000000001626000-memory.dmp themida behavioral1/files/0x0008000000017488-15.dat themida behavioral1/memory/2828-18-0x0000000002400000-0x0000000002B36000-memory.dmp themida behavioral1/memory/2960-22-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-23-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-21-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-25-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-24-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2780-48-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-46-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-44-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-42-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-40-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-38-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-36-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-34-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-32-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-30-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-28-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-55-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-54-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-53-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-50-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-65-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-66-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-64-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-63-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-62-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-61-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-60-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-59-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-58-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-57-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2780-56-0x0000000000400000-0x0000000000B36000-memory.dmp themida behavioral1/memory/2960-68-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-69-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-70-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-71-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-72-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-73-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-74-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-75-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-76-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-77-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-78-0x0000000000050000-0x0000000000786000-memory.dmp themida behavioral1/memory/2960-79-0x0000000000050000-0x0000000000786000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rms = "\"C:\\Users\\Admin\\AppData\\Roaming\\RMS\\itunes.exe\"" e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rms = "\"C:\\Users\\Admin\\AppData\\Roaming\\RMS\\itunes.exe\"" itunes.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA itunes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 2960 itunes.exe 2780 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2960 set thread context of 2780 2960 itunes.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itunes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2816 reg.exe 528 reg.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2940 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 30 PID 2384 wrote to memory of 2940 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 30 PID 2384 wrote to memory of 2940 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 30 PID 2384 wrote to memory of 2940 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 30 PID 2384 wrote to memory of 2304 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 32 PID 2384 wrote to memory of 2304 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 32 PID 2384 wrote to memory of 2304 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 32 PID 2384 wrote to memory of 2304 2384 e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe 32 PID 2940 wrote to memory of 2816 2940 cmd.exe 33 PID 2940 wrote to memory of 2816 2940 cmd.exe 33 PID 2940 wrote to memory of 2816 2940 cmd.exe 33 PID 2940 wrote to memory of 2816 2940 cmd.exe 33 PID 2304 wrote to memory of 2828 2304 WScript.exe 34 PID 2304 wrote to memory of 2828 2304 WScript.exe 34 PID 2304 wrote to memory of 2828 2304 WScript.exe 34 PID 2304 wrote to memory of 2828 2304 WScript.exe 34 PID 2828 wrote to memory of 2960 2828 cmd.exe 36 PID 2828 wrote to memory of 2960 2828 cmd.exe 36 PID 2828 wrote to memory of 2960 2828 cmd.exe 36 PID 2828 wrote to memory of 2960 2828 cmd.exe 36 PID 2960 wrote to memory of 2752 2960 itunes.exe 37 PID 2960 wrote to memory of 2752 2960 itunes.exe 37 PID 2960 wrote to memory of 2752 2960 itunes.exe 37 PID 2960 wrote to memory of 2752 2960 itunes.exe 37 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2960 wrote to memory of 2780 2960 itunes.exe 39 PID 2752 wrote to memory of 528 2752 cmd.exe 40 PID 2752 wrote to memory of 528 2752 cmd.exe 40 PID 2752 wrote to memory of 528 2752 cmd.exe 40 PID 2752 wrote to memory of 528 2752 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe"C:\Users\Admin\AppData\Local\Temp\e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2816
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RMS\itunes.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\RMS\itunes.exeC:\Users\Admin\AppData\Roaming\RMS\itunes.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:528
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652B
MD5f00f994f768bb66309720a3a29502665
SHA1e2883d3789c3dd54b7f04a904cf88278526f17fe
SHA256f9792028ecadf12107a257f2a97e44e0f59fdb6257e1a50a4d36e5e17a4d0ff5
SHA512369eef69ef0f7b558925a2863cb9865cbd1d8fcade82232f57fa54e0d56662f0386d80720d6deedee8648c294d07a998630a628dcdd88acedb9bc42371bd1c96
-
Filesize
2.9MB
MD5c91f1586bb4bc9ea0953cdd3a7545227
SHA19fc644188b50deb00f77c0e9e0d78482e2a0619d
SHA256e6b0f81a947b7de134379b5be6827e5277fbdaedc9067654062ed94b0dd2aefd
SHA512044982c08afdc7c74fa59e1710f6e2697abe4985a4a8c8e6ec1dc5eb108d7758f04be26c158fb118f6f0866005fb4eb54b5f7b3d4844c351bc31d9f82f05e66e