Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
New Order List & Specification.scr
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
New Order List & Specification.scr
Resource
win10v2004-20241007-en
General
-
Target
New Order List & Specification.scr
-
Size
1.3MB
-
MD5
39f59475d4b4672638a90ac2e475cd90
-
SHA1
0fdabe47559fab6484f383fab08a451be9879f65
-
SHA256
13a65e23f4c45234d2e73ce746b29a13b10df6f5a7508087029432aa62d458c5
-
SHA512
f26355f9da0afa11fcc8782bad79c293735ba7a099f54b9bd60195122f9e7687ac322f93eba5d0caa7c0f2d49e7a4ce4f464bbb6cf08efb71e0cc998511b8b9d
-
SSDEEP
24576:rAOcZEhWQ3b+q83UrJ8aOZTI28rX3XW7gUr7ohP5/RCaezriRdNdQWTq6ai0bagZ:tooJ83UreIN3soVNRNezMdbTq6d4a55e
Malware Config
Extracted
remcos
3.3.0 Pro
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2468 osgexnsck.pif 2972 RegSvcs.exe -
Loads dropped DLL 5 IoCs
pid Process 2520 New Order List & Specification.scr 2520 New Order List & Specification.scr 2520 New Order List & Specification.scr 2520 New Order List & Specification.scr 2468 osgexnsck.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\43719123\\OSGEXN~1.PIF C:\\Users\\Admin\\AppData\\Roaming\\43719123\\tqsxtg.ekv" osgexnsck.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 2972 2468 osgexnsck.pif 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order List & Specification.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osgexnsck.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2468 osgexnsck.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2972 RegSvcs.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2468 2520 New Order List & Specification.scr 30 PID 2520 wrote to memory of 2468 2520 New Order List & Specification.scr 30 PID 2520 wrote to memory of 2468 2520 New Order List & Specification.scr 30 PID 2520 wrote to memory of 2468 2520 New Order List & Specification.scr 30 PID 2468 wrote to memory of 2476 2468 osgexnsck.pif 31 PID 2468 wrote to memory of 2476 2468 osgexnsck.pif 31 PID 2468 wrote to memory of 2476 2468 osgexnsck.pif 31 PID 2468 wrote to memory of 2476 2468 osgexnsck.pif 31 PID 2468 wrote to memory of 572 2468 osgexnsck.pif 32 PID 2468 wrote to memory of 572 2468 osgexnsck.pif 32 PID 2468 wrote to memory of 572 2468 osgexnsck.pif 32 PID 2468 wrote to memory of 572 2468 osgexnsck.pif 32 PID 2468 wrote to memory of 1996 2468 osgexnsck.pif 33 PID 2468 wrote to memory of 1996 2468 osgexnsck.pif 33 PID 2468 wrote to memory of 1996 2468 osgexnsck.pif 33 PID 2468 wrote to memory of 1996 2468 osgexnsck.pif 33 PID 2468 wrote to memory of 2000 2468 osgexnsck.pif 35 PID 2468 wrote to memory of 2000 2468 osgexnsck.pif 35 PID 2468 wrote to memory of 2000 2468 osgexnsck.pif 35 PID 2468 wrote to memory of 2000 2468 osgexnsck.pif 35 PID 2468 wrote to memory of 1492 2468 osgexnsck.pif 36 PID 2468 wrote to memory of 1492 2468 osgexnsck.pif 36 PID 2468 wrote to memory of 1492 2468 osgexnsck.pif 36 PID 2468 wrote to memory of 1492 2468 osgexnsck.pif 36 PID 2468 wrote to memory of 2368 2468 osgexnsck.pif 37 PID 2468 wrote to memory of 2368 2468 osgexnsck.pif 37 PID 2468 wrote to memory of 2368 2468 osgexnsck.pif 37 PID 2468 wrote to memory of 2368 2468 osgexnsck.pif 37 PID 2468 wrote to memory of 2624 2468 osgexnsck.pif 38 PID 2468 wrote to memory of 2624 2468 osgexnsck.pif 38 PID 2468 wrote to memory of 2624 2468 osgexnsck.pif 38 PID 2468 wrote to memory of 2624 2468 osgexnsck.pif 38 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39 PID 2468 wrote to memory of 2972 2468 osgexnsck.pif 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order List & Specification.scr"C:\Users\Admin\AppData\Local\Temp\New Order List & Specification.scr" /S1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\43719123\osgexnsck.pif"C:\Users\Admin\AppData\Roaming\43719123\osgexnsck.pif" tqsxtg.ekv2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:572
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5d40d39871eb1e08fb898f0f58dd9c138
SHA1c3e45c711297c286f8cf2e8ba1b35c7d545f1771
SHA256a1ec2daca2043eb4681d6b73b1e30ef93ad39ff794a1728d8d30a9cb2092c708
SHA5126a57255ff93d41d3e70b6e8a290aaf43f49d94f0f08dbe61bdd3f0f9cb5da0632acbb4b19d71cfc3a6b919cbca7c6e3952a347730238f598e75d886c405175ae
-
Filesize
919KB
MD5897d811670ccf4422316b304b8c09ec9
SHA15cb58926daa398a79c8d7299feac61492c07e4f0
SHA256b39a4320e002d1a7857ead4c2e5bb84f89a6e1377bfcf39e439d9a2ef89766da
SHA512bcb9be58d1f1b75d25dc08d1e0d6c1c2e039798dbdc9f6036c6e017eece57c5f370522f05b3ad5aa981855853fe5422b58b04127116492e9f24cfd23af4d0a56
-
Filesize
148B
MD5ab8b5ca3b1184654098d4ed8bf32748d
SHA183eecb18b962f39d0dad949d5893d1309348c309
SHA256d843b50f64819eb1ea32059d0c36150df25d37ea628093b5cced24ad30227829
SHA512197b7590e421d6dbbc3b65fda27d42c771545e0e4c4b8ef37f3da9f0f43a0247ac48765cc8f717046e6fed64ac71f1deaef660ba02e7a770514452931557acc4
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215
-
Filesize
758KB
MD5279dae7236f5f2488a4bacde6027f730
SHA129a012e5259739f24480cedfd6d5f2d860cfcdb3
SHA256415850f2706681a6d80708fca8ac18dcf97e58b8f3fdc7bc4b558ab15fc0a03f
SHA512b81276fc4d915a9721dae15aa064781a1dba665ff4864ccbdf624e8049c1b3c12a2b374f11cffcf6e4a5217766836edbc5f2376ffa8765f9070cbd87d7ae2fe8