Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 06:59
Static task
static1
Behavioral task
behavioral1
Sample
02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe
Resource
win10v2004-20241007-en
General
-
Target
02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe
-
Size
140KB
-
MD5
6dc84ad7ef1ac736530211cc881fd2a0
-
SHA1
5778b7fbeab9b188c22c6975e723ec5e67a69411
-
SHA256
02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869
-
SHA512
c4a769014f46856e9846690bd86753ef1ab74bef02ac1513db5f229bab8b6809020bc0d9ca8abef1d90349b55d295667058ce4261b00bb015e4dadca9d9be6fa
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVST:xP6/M+WLckOBhVmIYq
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe -
Executes dropped EXE 2 IoCs
pid Process 1648 wn2ra4ohzdr.exe 3900 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 3900 1648 wn2ra4ohzdr.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3900 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1648 2696 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe 90 PID 2696 wrote to memory of 1648 2696 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe 90 PID 2696 wrote to memory of 1648 2696 02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe 90 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97 PID 1648 wrote to memory of 3900 1648 wn2ra4ohzdr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe"C:\Users\Admin\AppData\Local\Temp\02685371fedd6882df6bb6c55923098a25dd500b474d2c5162e9bb541dd78869N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5298a6d99074ab012b2649d8b085dcf2e
SHA153c1a7408058e127b9073a4b78422ae1a1282862
SHA2564c419a1f8a34ebb02ee9b3da420ae74bd06d4682b5a827eb3eda1e3cb058aeed
SHA5128cabee9e97b55a413d89a420920e611831698bc46490efaa138aa7dab5c560fd4665738982d33c5da458be74828974dbb7a12f558e7cc6278f2d1799b905be93