Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 03:30
Behavioral task
behavioral1
Sample
af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe
Resource
win10v2004-20241007-en
General
-
Target
af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe
-
Size
483KB
-
MD5
38c479083ba7387ebad73f3b67020eab
-
SHA1
48bbd0bf1d333293c22c96b7731ba54343d7f8fe
-
SHA256
af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
-
SHA512
23632f540c6e287a31828cdb7eac23ca5acd8653908f6211fadafb64734bafcecb34f7a27f3ee843dce054397b1ae5b723f467ebeca5d66d52320ba7909f7fbe
-
SSDEEP
6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrztA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzSA4
Malware Config
Extracted
remcos
Hello World!
46.175.167.116:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Realtek Driver.exe
-
copy_folder
Realtek Audio
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Realtek Audio-J15M0S
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Realtek Driver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 Realtek Driver.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" Realtek Driver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S = "\"C:\\Users\\Admin\\AppData\\Roaming\\Realtek Audio\\Realtek Driver.exe\"" af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5060 set thread context of 1536 5060 Realtek Driver.exe 84 PID 1536 set thread context of 2444 1536 iexplore.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Realtek Driver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5060 Realtek Driver.exe 5060 Realtek Driver.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5060 Realtek Driver.exe 1536 iexplore.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3344 wrote to memory of 5060 3344 af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe 83 PID 3344 wrote to memory of 5060 3344 af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe 83 PID 3344 wrote to memory of 5060 3344 af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe 83 PID 5060 wrote to memory of 1536 5060 Realtek Driver.exe 84 PID 5060 wrote to memory of 1536 5060 Realtek Driver.exe 84 PID 5060 wrote to memory of 1536 5060 Realtek Driver.exe 84 PID 5060 wrote to memory of 1536 5060 Realtek Driver.exe 84 PID 1536 wrote to memory of 2444 1536 iexplore.exe 85 PID 1536 wrote to memory of 2444 1536 iexplore.exe 85 PID 1536 wrote to memory of 2444 1536 iexplore.exe 85 PID 1536 wrote to memory of 2444 1536 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe"C:\Users\Admin\AppData\Local\Temp\af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Roaming\Realtek Audio\Realtek Driver.exe"C:\Users\Admin\AppData\Roaming\Realtek Audio\Realtek Driver.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2444
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD538c479083ba7387ebad73f3b67020eab
SHA148bbd0bf1d333293c22c96b7731ba54343d7f8fe
SHA256af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
SHA51223632f540c6e287a31828cdb7eac23ca5acd8653908f6211fadafb64734bafcecb34f7a27f3ee843dce054397b1ae5b723f467ebeca5d66d52320ba7909f7fbe