Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 03:37
Behavioral task
behavioral1
Sample
97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe
Resource
win7-20241010-en
General
-
Target
97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe
-
Size
482KB
-
MD5
e61d35b4c0deb8fecc6433b5a7428de7
-
SHA1
0775f95b8987295db7dabef76f5a248bd667a1d6
-
SHA256
97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98
-
SHA512
432086fcc5cef2eb1c4df51a753ede7a352488e58ad2e956a47815580794da2aa941f68bdb826bb3031d15bae110f7d8b4f982e9e9cb1be2fcf298e24d16e077
-
SSDEEP
12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQ1S:jak/mBXTV/R0nEF76gFZi
Malware Config
Extracted
remcos
winslogon
194.180.48.18:45265
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
winslogon.exe
-
copy_folder
winslogon
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
winslogon
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
winslogon-BNBAGB
-
screenshot_crypt
true
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
true
-
take_screenshot_time
60
-
take_screenshot_title
pay;money;wallet;dashboard;notpad;password;login;user;payment;signin;crypto;metamask;bitcoin;secret;phrase;seed;seedphrase
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" winslogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winslogon.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 winslogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" winslogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winslogon-BNBAGB = "\"C:\\Users\\Admin\\AppData\\Roaming\\winslogon\\winslogon.exe\"" winslogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2760 set thread context of 3048 2760 winslogon.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2480 reg.exe 1508 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 winslogon.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2760 winslogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 winslogon.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2316 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 30 PID 2208 wrote to memory of 2316 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 30 PID 2208 wrote to memory of 2316 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 30 PID 2208 wrote to memory of 2316 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 30 PID 2316 wrote to memory of 2480 2316 cmd.exe 32 PID 2316 wrote to memory of 2480 2316 cmd.exe 32 PID 2316 wrote to memory of 2480 2316 cmd.exe 32 PID 2316 wrote to memory of 2480 2316 cmd.exe 32 PID 2208 wrote to memory of 2760 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 33 PID 2208 wrote to memory of 2760 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 33 PID 2208 wrote to memory of 2760 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 33 PID 2208 wrote to memory of 2760 2208 97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe 33 PID 2760 wrote to memory of 2888 2760 winslogon.exe 34 PID 2760 wrote to memory of 2888 2760 winslogon.exe 34 PID 2760 wrote to memory of 2888 2760 winslogon.exe 34 PID 2760 wrote to memory of 2888 2760 winslogon.exe 34 PID 2888 wrote to memory of 1508 2888 cmd.exe 36 PID 2888 wrote to memory of 1508 2888 cmd.exe 36 PID 2888 wrote to memory of 1508 2888 cmd.exe 36 PID 2888 wrote to memory of 1508 2888 cmd.exe 36 PID 2760 wrote to memory of 3048 2760 winslogon.exe 37 PID 2760 wrote to memory of 3048 2760 winslogon.exe 37 PID 2760 wrote to memory of 3048 2760 winslogon.exe 37 PID 2760 wrote to memory of 3048 2760 winslogon.exe 37 PID 2760 wrote to memory of 3048 2760 winslogon.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe"C:\Users\Admin\AppData\Local\Temp\97495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2480
-
-
-
C:\Users\Admin\AppData\Roaming\winslogon\winslogon.exe"C:\Users\Admin\AppData\Roaming\winslogon\winslogon.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1508
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
482KB
MD5e61d35b4c0deb8fecc6433b5a7428de7
SHA10775f95b8987295db7dabef76f5a248bd667a1d6
SHA25697495c8622198ded0c7900667e021c4d1aaac9e1ce7ed8c7bc3b213644304b98
SHA512432086fcc5cef2eb1c4df51a753ede7a352488e58ad2e956a47815580794da2aa941f68bdb826bb3031d15bae110f7d8b4f982e9e9cb1be2fcf298e24d16e077