Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 08:14
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-STACK107947-Handel 9037536899.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-STACK107947-Handel 9037536899.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-STACK107947-Handel 9037536899.exe
-
Size
1.2MB
-
MD5
47e1e075f34cfeaf55a5f3a02a2e8737
-
SHA1
e77a60ba845c8e060af8e836e304becf566238f1
-
SHA256
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3
-
SHA512
7631c2b8bbdca6836663f6c6a50a2afe17acae17cd31cfcdb81fd1d9b424c6666e24fffe4c9f60266b5c3c6279497eb71d482810a37b7513171355a10c887e85
-
SSDEEP
24576:bN/BUBb+tYjBFHNuuNVNtaST6Zi223WD8AvpqFXiM0hD6di/Ad:JpUlRhNV7XaSTTB3Wrx+XiM0hDTc
Malware Config
Extracted
remcos
RemoteHost
206.189.218.238:4782
206.189.218.238:2286
206.189.218.238:3363
206.189.218.238:3386
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9IFJWE
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2336 exiguvxrrb.mp3 2352 RegSvcs.exe -
Loads dropped DLL 2 IoCs
pid Process 2600 cmd.exe 2336 exiguvxrrb.mp3 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TimerDate = "C:\\Users\\Admin\\gase\\EXIGUV~1.EXE C:\\Users\\Admin\\gase\\JUJQDL~1.EXE" exiguvxrrb.mp3 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2352 2336 exiguvxrrb.mp3 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-STACK107947-Handel 9037536899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exiguvxrrb.mp3 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2016 ipconfig.exe 1700 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 2336 exiguvxrrb.mp3 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 RegSvcs.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3000 2280 RFQ-STACK107947-Handel 9037536899.exe 28 PID 2280 wrote to memory of 3000 2280 RFQ-STACK107947-Handel 9037536899.exe 28 PID 2280 wrote to memory of 3000 2280 RFQ-STACK107947-Handel 9037536899.exe 28 PID 2280 wrote to memory of 3000 2280 RFQ-STACK107947-Handel 9037536899.exe 28 PID 3000 wrote to memory of 2676 3000 WScript.exe 32 PID 3000 wrote to memory of 2676 3000 WScript.exe 32 PID 3000 wrote to memory of 2676 3000 WScript.exe 32 PID 3000 wrote to memory of 2676 3000 WScript.exe 32 PID 3000 wrote to memory of 2600 3000 WScript.exe 33 PID 3000 wrote to memory of 2600 3000 WScript.exe 33 PID 3000 wrote to memory of 2600 3000 WScript.exe 33 PID 3000 wrote to memory of 2600 3000 WScript.exe 33 PID 2676 wrote to memory of 2016 2676 cmd.exe 36 PID 2676 wrote to memory of 2016 2676 cmd.exe 36 PID 2676 wrote to memory of 2016 2676 cmd.exe 36 PID 2676 wrote to memory of 2016 2676 cmd.exe 36 PID 2600 wrote to memory of 2336 2600 cmd.exe 37 PID 2600 wrote to memory of 2336 2600 cmd.exe 37 PID 2600 wrote to memory of 2336 2600 cmd.exe 37 PID 2600 wrote to memory of 2336 2600 cmd.exe 37 PID 3000 wrote to memory of 2356 3000 WScript.exe 38 PID 3000 wrote to memory of 2356 3000 WScript.exe 38 PID 3000 wrote to memory of 2356 3000 WScript.exe 38 PID 3000 wrote to memory of 2356 3000 WScript.exe 38 PID 2356 wrote to memory of 1700 2356 cmd.exe 40 PID 2356 wrote to memory of 1700 2356 cmd.exe 40 PID 2356 wrote to memory of 1700 2356 cmd.exe 40 PID 2356 wrote to memory of 1700 2356 cmd.exe 40 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41 PID 2336 wrote to memory of 2352 2336 exiguvxrrb.mp3 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xcjj.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c exiguvxrrb.mp3 jujqdllgg.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\exiguvxrrb.mp3exiguvxrrb.mp3 jujqdllgg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5dab7b46a4ab4269066b717fa815a95e5
SHA16f7fb9b2676fec41a48f9bbc66afa1437c03c6a6
SHA2562aebae86fcf7b37c76408362b83a1a21f2189a984a08cd51093d916f14fee22f
SHA5122501a510777937540ad949225219505cef99d60293149a8bef9d6844ac26565a59015407bdef44bc6c4aec952c1e491f840392c0e5948b3d2a7d4c69f10f975c
-
Filesize
540B
MD5de178a4a202c9888ed7a208c6a644149
SHA1d4892d8fcec4b1c57eca7223f4bbfb0506fd0d86
SHA25638d4b4ce2be0f554972ffb928dfebb173eff84fc06239378439e2c81a3d984fb
SHA5121843e3ea7c944c5b5b77404450cf7104d5ceb48790b94304f905a2c2af400c42749397e33687f3e4e203fdb1a62b07daa12b113c6377ac1ed085bdc8ee0fc661
-
Filesize
589B
MD543ab8138ddbc9794f1dce0a4ba6a4b77
SHA1f09c85ab35e3cae3bfbeee9ad8a82169112f9430
SHA2565282b99fdf8732d28c18c09e8e511d0ace18bf8beb3f3428fc689c3e4ffafee1
SHA512eefe38bfb89688f3bfe51119a6624c6b73229deedb14c9aed4eca81412117a7f971a64ef0dec85105ab4f1680433b53364652a324e6918c817c719d080b3316a
-
Filesize
879KB
MD5ba3227a6a7e9aae129c0fb82bb511b95
SHA126985630ffdb7ca1caf18b4dd4edbb52a4c840be
SHA256829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762
SHA512ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef
-
Filesize
636B
MD57a4680111fe13184dded5fea94deab57
SHA14d49592817d53f9c5727b64ae51c485c8ce50e2d
SHA25697d2cf558bc2c88fe59361c97d4e0f1effe058507539db2817a22a68408ae539
SHA5125485a1c5f9fafadba68d91a4f87b742f392810c458d783d73646cc46a35074f8ca3b268eb6e7895ee1a6bcddfb9d5251be250c5ded25a57cb0df783641379728
-
Filesize
505B
MD59a7431dbadb74ce902f3badc0522cde9
SHA17de32340b63d9371a6df6ff3f527dd3718494507
SHA2561fe9e5fe9e421a044169446ebdc54d526f7ed7189e14b47425edf28fd0705973
SHA512e531547945bbc137ee0154bee4cec0ad83e7d6349e6492058b13845eab0aa98ff69b54fc02d3ae3d476d5f21f274c156b798733137dbe29469d087c2de706309
-
Filesize
543B
MD53f31479ce20169658fc0bece91baa21b
SHA1ac7a707272f9a133d2e2af767c5bb0dcafb856cc
SHA256f663efea5d17f2f90e06476dd0bd9aad18f5c90b9c6ecd022b7160fca4461157
SHA5120a768f29c6d8b2d1c182620636826b975bae75349e218a18cd2c0718602bd727946dc8840d03b567609f4889927365fd3b28f92d37b4588005e20cfbd24e4a88
-
Filesize
561B
MD5efe9dc4398235606e348de0013613184
SHA1e27eef54f971a81bdc9aea7d9f8c3a84aaa8ec17
SHA2560020a0b64c7d7a95332bdc6543570b22435b9c6527c272fd69482f110cd78c3b
SHA512e7b79ffa520e8b6e642d0db64393a451ded061c212fcd4a187825f5f841ecc16a28b167f653d0b150d368bbe717fa185df24a48acff4b91281da1655d7496b0c
-
Filesize
621B
MD511a0b4476265f1b9bd3bfc3cbcca409a
SHA1ee306624f25b60f575faded8aff91ff6e28b2e9b
SHA25639e19d90cfc180f1111493759da8332a33556e5f740304a8d93ff7eebe5821e0
SHA512ed7b19d4cc6acb124cccecc5d73e4fac8dda1fc8e742bd61a932ce97a7b9ede679ddcbaff3eb43c79137635ecc2a58fdb87eb25e0a7e8ba4e713f76d025538d6
-
Filesize
569B
MD589e312356ee07d906a15cc74b6232498
SHA18e0d8c1dbe8f98fa7a58a24eb06cec1230199591
SHA256a3257e955945f6e1fac689fe2efad79ec9511e54140b550b95f99bc849478205
SHA5121d296d08ea8b0962b6e067e47146746a4c2399868073b6beffbb85c359727aa3f2825e7807bcbdfbf75bcab07521d3eb0567a89c37d011d0088ad3f809cf3e15
-
Filesize
529B
MD5fad42d64e2ba33efc46ae738fb5b0a65
SHA16283fdad73c2e71f01653404a84cb04d6b1e72b6
SHA2561ff4a0f98969d45df0bb6aab8bd32fd9a5db6b2c3311687a6784340fe92deb3b
SHA51207d775a9801c5159b6b8d8c7c99f1dfc7db2757b6c195fef94f919301d4189c3ba99ab2f39e4de578661086bd51bfd9537e6df96b0f15b9532cc67a7f6c0b380
-
Filesize
525B
MD526d1ef03f059035062a953fe56189805
SHA124627042e99874582bf23a3cafbe84488dfddc2d
SHA256df23df9b0925d87f771fe30c4941968a7941d30e61fc095f5858859998e9a3a4
SHA5126373d740a7c2067b8a0f044f9a3b88a699a3024f0b3588efe97804f5ffee8d766737b616646fce37f15446396e82abb8bfb60bb0a5221b1b2f60f5a1e3cee931
-
Filesize
38KB
MD55a16abae8e2e76243cb64e663c433b7c
SHA133603c697a678d7de33337d4cc256823a757e370
SHA2560f3346373c8f156af575a6cf5fddea7a0591e9e98c55911da92c1d0247b42879
SHA512ae7b40466e076e3f5e134c144bcf0387376e8848290d500b1680fd815682a5cffe323385f382d191fc36f77fdc168062d02ea5085c440af95df6c9f21bf8aa58
-
Filesize
38KB
MD54ba1e3dd70b841631605154d0a873e12
SHA13822b13b2cc21b0e6eece2a369ce270711d34f09
SHA256c0463353430c226c83582d11c75816d54dc896e27ca9f6200571c90cbec7d156
SHA512abbaa2045a0eef1daa302e1fb4d241256293f52ade097d4076df7af9d77fe1c881fb21b87bb6b506f965af41b69f8db410c81f6c13688919a193cbd3416a14b5
-
Filesize
516B
MD5640f2177d9892474d0ac242c3667f3ff
SHA1e3de1e8744713f4c8eea3d22810caaf6b98a38d5
SHA2565370805ea5277af13d06cba90923f43f89ce71b307f1a5bc8713078d73fdcfae
SHA512b03300bc6e37b18f80a8028a6ce9efd76bc9d9475fbd3bd1226ef4aa746214254e896fc8ee979e34f0d626317c203e990a938b481c23346ee502e7481f872b60
-
Filesize
562B
MD5ff26772d011d610c7f4bdd0a05401831
SHA1023503721ab26a0266caac724b5ed945c6c44c3d
SHA25678f9d09766359845345936b969282547fba8a5d1a9153eb9f6b7832ca306941e
SHA51221ae9e92426494782594355582ba6c7bbce0fc741ba598570306b3bfc4b74a4df6d8cf18cd8e755230d42133598b9aa5ba2c5b3df94de302505b5649f2c10853
-
Filesize
541B
MD59d2a1420104961db5f6c3acdd78c5413
SHA1aed36a59b5e04e74dba7993108a3036bc0c4841c
SHA25668e829ee0130254050cebb8138bcf651453d4cc85267408c32536e549cd64797
SHA5127cbdf7ace371d7eed837b3a1f4fe3c4cb8a71b423fec30c3fd2868d7dac561c39f7eb15beea94ef67edc782210d3297f610e6e251401e6cbb8b0df6e702e31a2
-
Filesize
547B
MD57f669e5f6c40f60176941426b38c636f
SHA1ba19a13d936e2484091b034dec5a797f82fc0471
SHA256f806baf083a66ee897f8d9df01c94450cc497020fae845aee7a3ad9658de8bb6
SHA5126c021e4af83758c1d4e24537f40499c68499e36deca4bf052f6ad35ed4ebbc7bf7096f38f43478fd21a689cc4330f78662599c39a72ca9bd48ac7d1ab6205c66
-
Filesize
601B
MD574d3eb0b1855cd07983c292bb948d99d
SHA14697ee314d8ebebd7eac6c59a7448a61e409a64f
SHA2562d1e1cb356c1fc8dad4f704f2132e26c9d61aa6807c3663805cb3edffd54309d
SHA512bbd22f507e9c163df6d1c0806e72615d444615bcac0e2c726c40260e76f91ae3168dff74d86435a22c701cb2167e2a555340984608f3e60fd68bd0cc6f3bc7a9
-
Filesize
570B
MD516f8862470abc9bd3d5af4f6458a2c57
SHA1212d077a18d28b73fbf7df9d633159b22e627505
SHA25605b2d07b29ce1f6b110a3bb9232fc05cbd8f46e40318a18496a5c4f882388c4c
SHA512604cbff97d151d314c41e5da9a6ea5f5c8d6514713810e64dd3b085be3e46a6617284af838d5b15da1eeeb2d897528dc20d73b273ca53f9c4d96c3386809f3c7
-
Filesize
588B
MD5fdc0435dee47f452b76364dad3ff3851
SHA12c7e75bc1d2b2eeafaa17c60265d13143eb2a5db
SHA256ef71c9b03d4d8b03f39f052f46b37d89536f35427bce1104913c10da3b9c1fa1
SHA51235693775653fd90add369b4a811d10fe4cb621075347263b09560f0c7bfa93309de737f18a719f2339fd3830b312cc14c18062d2b80abcb74ae3ff57c229d274
-
Filesize
193KB
MD55020f5d94271ef49423393f311102b84
SHA165d7cafb647474b3278700253e453994c8c5c258
SHA256a43c103960d14ddba7698b76852aebde85546b01cb51fd309a05577ca89cb757
SHA5124c10f02f12e81ab055e8b6df8cc64e087be826db89b81ba3b8434f2a3d988d32e4ed5587d7dfc57d809ae75544c0f26462977afff569b7a49bb58bac2c9851bd
-
Filesize
510B
MD56db48d994592c7e89326e10e0534f02e
SHA1aa594bec5eba9cb186c30846c84fbf8d6ce88207
SHA25606e928e3cd0c3e5ba69009535950c5a9f2848f86b68341fadc05cd6d885f3daa
SHA512dcc67b7a13bc1ff78c88fc7ea3f774c57ea68c054cbe1bff9cf89fa412f0502999ebae57d635c28c42f549df04b5590444899910b143b4b1d90540e2642c5b66
-
Filesize
514B
MD5bd4f78f00044397b048515feac7d70f9
SHA14b1b749c5e6cabbee3f24518680302426eee6f5f
SHA2568ff5afb75964a740cddfdde8b059d4ea069ec44d4e11fc70824433a9a1830914
SHA5129f784e1e8f92e599ca9931916e7b909f4b18a4ded43b0712c231ced5351ae2b729f07f258e5d72c4e9f495a6cedf31204e2f1a98d0aa45f21e54f9312b8dee38
-
Filesize
568B
MD59130e3d39ad7a5a96b41bb801ebeb126
SHA185088abd1788bbd886ac37c3a4b4b6f13e2effa3
SHA256e37478a8080c9dc35926872ea64541b112bcd9406e48243c9794f95ce30327e0
SHA512eef4013e76613897c5b13ce536fd26e257b5f3086d80d32a9b77af3cfa90862dc40fbefba3021e4bd3dfb045500c49473b605e1517daf561f5a0e9bf4a3ac786
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215