Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240729-en
General
-
Target
3.exe
-
Size
943KB
-
MD5
44987550d90e3bd86f36455b27944b9d
-
SHA1
2d5bb86a33fb4f73713c31eda7ce935dc126cc14
-
SHA256
1ec5faab8689f3aceb90da9055752f1ff83b0197048bc8e0b7c96114c85b5d17
-
SHA512
e603b047708ca7a4ed76bfc25675a620145959ace70eb675e216c066b6bf35b5a287a4cc411aa7c6e9f149c6f6644df39bce2756f5c2d6a455fcc12c6801bf33
-
SSDEEP
24576:bdFea6fyBIImRuR5BC9wwbFuaAOfsTz/lpJZakt:Rz6UmRuR/6wq5AOfu/1Za
Malware Config
Extracted
remcos
ood
goody.work.gd:4173
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
vlc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
ios
-
mouse_option
false
-
mutex
gig-R8G1B2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
sos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 1488 1356 3.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 1660 1356 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91 PID 1356 wrote to memory of 1488 1356 3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 12002⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1356 -ip 13561⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5218646d183350aee6b50cf397ec48fd9
SHA1a3a91f37fa33822b1bb020f32fa0af67823c0df3
SHA25687f360dae60769de85cd8df987e3e3cc513f02353e375cdd68e31e8689523982
SHA5120fef7fd77385eb115fb8ef957cb1c488325d873e22e5f700572d183780d57825ecaffd3412902957ccb9a87671f1b00a98a203f49532cfcc64cc2c8403d7e33e