Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
Resource
win10v2004-20241007-en
General
-
Target
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe
-
Size
1.3MB
-
MD5
201ae8144aced76058811bcf23070290
-
SHA1
f0949cd0a1b002d70385e3ee147df20b64a8542e
-
SHA256
b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041
-
SHA512
8dd789fff082f4e872bf4e592ff4fab749d38cad26f543b9399d39125b8019a1f4fc957d8dc297c88fe7dd1b41eea07cadfe7492a04400c15a82a959a0ee7930
-
SSDEEP
24576:FyiWFOB4sNYg2yWQCsMMKSfVrgEEAhmeKKYwOIscs+mXjr6:pB4zgWQ+MFfVrg8hmxKNPs7pf
Malware Config
Extracted
remcos
3.2.1 Pro
Grace_2021
jamaru1444.myftp.biz:2019
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
win32.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NLZOMN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
win
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2580 win32.exe 2404 win32.exe -
Loads dropped DLL 1 IoCs
pid Process 2680 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" win32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2324 set thread context of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2580 set thread context of 2404 2580 win32.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 win32.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2324 wrote to memory of 2236 2324 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 31 PID 2236 wrote to memory of 2728 2236 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 32 PID 2236 wrote to memory of 2728 2236 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 32 PID 2236 wrote to memory of 2728 2236 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 32 PID 2236 wrote to memory of 2728 2236 b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe 32 PID 2728 wrote to memory of 2680 2728 WScript.exe 33 PID 2728 wrote to memory of 2680 2728 WScript.exe 33 PID 2728 wrote to memory of 2680 2728 WScript.exe 33 PID 2728 wrote to memory of 2680 2728 WScript.exe 33 PID 2680 wrote to memory of 2580 2680 cmd.exe 35 PID 2680 wrote to memory of 2580 2680 cmd.exe 35 PID 2680 wrote to memory of 2580 2680 cmd.exe 35 PID 2680 wrote to memory of 2580 2680 cmd.exe 35 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37 PID 2580 wrote to memory of 2404 2580 win32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"C:\Users\Admin\AppData\Local\Temp\b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win32.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\win32.exeC:\Users\Admin\AppData\Roaming\win32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Roaming\win32.exe"C:\Users\Admin\AppData\Roaming\win32.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD50023c43bc14320440f81eb67a28e9e99
SHA149ac6fcc2550105a92c6ba7a1194e09bafc00ca3
SHA2565403135310d071b0f43b3b153a3aa636d29d3cf7ccfc2a66550f18e10aa6da21
SHA5125781f081ca10e112af8402de496c87978f06295620a0331f9226bf6f0637da0aacaf952fe1a3e7d1c9dbcfc0a5a578c22267533b7e5fa4a3ba0b6cc5dc3492bf
-
Filesize
148B
MD57d0f0f70105dbe0739502edf92732e29
SHA1fd433a94ca9606e94233782c6fbcb7cb6b6877c0
SHA256ef6cc2fe39125e76d2df5c2e59a570356eb7e50889343f49e2d56823f7cc0790
SHA512b1aff6717c8ed6d6a91bd4c37a8c0d4477748546b9630ecbf754a65e92d35e9b4debcc6a4a5a97cc10cf3bc62c341aa192c8af9af0901f6c1ca8b72023f50bf5
-
Filesize
1.3MB
MD5201ae8144aced76058811bcf23070290
SHA1f0949cd0a1b002d70385e3ee147df20b64a8542e
SHA256b766e6f83882eeb863ead8d6da23f8725771efc97b974240eaff856f8365c041
SHA5128dd789fff082f4e872bf4e592ff4fab749d38cad26f543b9399d39125b8019a1f4fc957d8dc297c88fe7dd1b41eea07cadfe7492a04400c15a82a959a0ee7930