Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
New Order List & Specification.scr
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
New Order List & Specification.scr
Resource
win10v2004-20241007-en
General
-
Target
New Order List & Specification.scr
-
Size
1.3MB
-
MD5
39f59475d4b4672638a90ac2e475cd90
-
SHA1
0fdabe47559fab6484f383fab08a451be9879f65
-
SHA256
13a65e23f4c45234d2e73ce746b29a13b10df6f5a7508087029432aa62d458c5
-
SHA512
f26355f9da0afa11fcc8782bad79c293735ba7a099f54b9bd60195122f9e7687ac322f93eba5d0caa7c0f2d49e7a4ce4f464bbb6cf08efb71e0cc998511b8b9d
-
SSDEEP
24576:rAOcZEhWQ3b+q83UrJ8aOZTI28rX3XW7gUr7ohP5/RCaezriRdNdQWTq6ai0bagZ:tooJ83UreIN3soVNRNezMdbTq6d4a55e
Malware Config
Extracted
remcos
3.3.0 Pro
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation New Order List & Specification.scr Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation osgexnsck.pif -
Executes dropped EXE 2 IoCs
pid Process 3772 osgexnsck.pif 1488 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\43719123\\OSGEXN~1.PIF C:\\Users\\Admin\\AppData\\Roaming\\43719123\\tqsxtg.ekv" osgexnsck.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3772 set thread context of 1488 3772 osgexnsck.pif 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order List & Specification.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osgexnsck.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3772 osgexnsck.pif 3772 osgexnsck.pif -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3772 osgexnsck.pif 1488 RegSvcs.exe 1488 RegSvcs.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3772 4952 New Order List & Specification.scr 82 PID 4952 wrote to memory of 3772 4952 New Order List & Specification.scr 82 PID 4952 wrote to memory of 3772 4952 New Order List & Specification.scr 82 PID 3772 wrote to memory of 4468 3772 osgexnsck.pif 84 PID 3772 wrote to memory of 4468 3772 osgexnsck.pif 84 PID 3772 wrote to memory of 4468 3772 osgexnsck.pif 84 PID 3772 wrote to memory of 2360 3772 osgexnsck.pif 85 PID 3772 wrote to memory of 2360 3772 osgexnsck.pif 85 PID 3772 wrote to memory of 2360 3772 osgexnsck.pif 85 PID 3772 wrote to memory of 3244 3772 osgexnsck.pif 91 PID 3772 wrote to memory of 3244 3772 osgexnsck.pif 91 PID 3772 wrote to memory of 3244 3772 osgexnsck.pif 91 PID 3772 wrote to memory of 1548 3772 osgexnsck.pif 94 PID 3772 wrote to memory of 1548 3772 osgexnsck.pif 94 PID 3772 wrote to memory of 1548 3772 osgexnsck.pif 94 PID 3772 wrote to memory of 4608 3772 osgexnsck.pif 95 PID 3772 wrote to memory of 4608 3772 osgexnsck.pif 95 PID 3772 wrote to memory of 4608 3772 osgexnsck.pif 95 PID 3772 wrote to memory of 3452 3772 osgexnsck.pif 97 PID 3772 wrote to memory of 3452 3772 osgexnsck.pif 97 PID 3772 wrote to memory of 3452 3772 osgexnsck.pif 97 PID 3772 wrote to memory of 1304 3772 osgexnsck.pif 99 PID 3772 wrote to memory of 1304 3772 osgexnsck.pif 99 PID 3772 wrote to memory of 1304 3772 osgexnsck.pif 99 PID 3772 wrote to memory of 1488 3772 osgexnsck.pif 100 PID 3772 wrote to memory of 1488 3772 osgexnsck.pif 100 PID 3772 wrote to memory of 1488 3772 osgexnsck.pif 100 PID 3772 wrote to memory of 1488 3772 osgexnsck.pif 100 PID 3772 wrote to memory of 1488 3772 osgexnsck.pif 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order List & Specification.scr"C:\Users\Admin\AppData\Local\Temp\New Order List & Specification.scr" /S1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Roaming\43719123\osgexnsck.pif"C:\Users\Admin\AppData\Roaming\43719123\osgexnsck.pif" tqsxtg.ekv2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
57KB
MD5d40d39871eb1e08fb898f0f58dd9c138
SHA1c3e45c711297c286f8cf2e8ba1b35c7d545f1771
SHA256a1ec2daca2043eb4681d6b73b1e30ef93ad39ff794a1728d8d30a9cb2092c708
SHA5126a57255ff93d41d3e70b6e8a290aaf43f49d94f0f08dbe61bdd3f0f9cb5da0632acbb4b19d71cfc3a6b919cbca7c6e3952a347730238f598e75d886c405175ae
-
Filesize
758KB
MD5279dae7236f5f2488a4bacde6027f730
SHA129a012e5259739f24480cedfd6d5f2d860cfcdb3
SHA256415850f2706681a6d80708fca8ac18dcf97e58b8f3fdc7bc4b558ab15fc0a03f
SHA512b81276fc4d915a9721dae15aa064781a1dba665ff4864ccbdf624e8049c1b3c12a2b374f11cffcf6e4a5217766836edbc5f2376ffa8765f9070cbd87d7ae2fe8
-
Filesize
919KB
MD5897d811670ccf4422316b304b8c09ec9
SHA15cb58926daa398a79c8d7299feac61492c07e4f0
SHA256b39a4320e002d1a7857ead4c2e5bb84f89a6e1377bfcf39e439d9a2ef89766da
SHA512bcb9be58d1f1b75d25dc08d1e0d6c1c2e039798dbdc9f6036c6e017eece57c5f370522f05b3ad5aa981855853fe5422b58b04127116492e9f24cfd23af4d0a56
-
Filesize
148B
MD51b8e6c166790c0b4c92a52f022020f76
SHA137bb22b035eec1898c70caebcc142fca06b2af5a
SHA25687ae526015dc2531ad9a3016779873a6f9e32381b36eb3dc7d32855af9e7a95e
SHA51278b7e4b9fbcbaea8e245639b03deb1cdd7112db514c12a809d253c49181db9cdfdee4e823963f3b8422ca8b35b96719bc09ba37319f51e4e3c1637a0d4110479