Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-STACK107947-Handel 9037536899.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RFQ-STACK107947-Handel 9037536899.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ-STACK107947-Handel 9037536899.exe
-
Size
1.2MB
-
MD5
47e1e075f34cfeaf55a5f3a02a2e8737
-
SHA1
e77a60ba845c8e060af8e836e304becf566238f1
-
SHA256
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3
-
SHA512
7631c2b8bbdca6836663f6c6a50a2afe17acae17cd31cfcdb81fd1d9b424c6666e24fffe4c9f60266b5c3c6279497eb71d482810a37b7513171355a10c887e85
-
SSDEEP
24576:bN/BUBb+tYjBFHNuuNVNtaST6Zi223WD8AvpqFXiM0hD6di/Ad:JpUlRhNV7XaSTTB3Wrx+XiM0hDTc
Malware Config
Extracted
remcos
RemoteHost
206.189.218.238:4782
206.189.218.238:2286
206.189.218.238:3363
206.189.218.238:3386
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9IFJWE
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation RFQ-STACK107947-Handel 9037536899.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 440 exiguvxrrb.mp3 1220 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimerDate = "C:\\Users\\Admin\\gase\\EXIGUV~1.EXE C:\\Users\\Admin\\gase\\JUJQDL~1.EXE" exiguvxrrb.mp3 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 440 set thread context of 1220 440 exiguvxrrb.mp3 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exiguvxrrb.mp3 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ-STACK107947-Handel 9037536899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2300 ipconfig.exe 5028 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings RFQ-STACK107947-Handel 9037536899.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 440 exiguvxrrb.mp3 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1220 RegSvcs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4304 4644 RFQ-STACK107947-Handel 9037536899.exe 83 PID 4644 wrote to memory of 4304 4644 RFQ-STACK107947-Handel 9037536899.exe 83 PID 4644 wrote to memory of 4304 4644 RFQ-STACK107947-Handel 9037536899.exe 83 PID 4304 wrote to memory of 348 4304 WScript.exe 86 PID 4304 wrote to memory of 348 4304 WScript.exe 86 PID 4304 wrote to memory of 348 4304 WScript.exe 86 PID 4304 wrote to memory of 1816 4304 WScript.exe 88 PID 4304 wrote to memory of 1816 4304 WScript.exe 88 PID 4304 wrote to memory of 1816 4304 WScript.exe 88 PID 348 wrote to memory of 2300 348 cmd.exe 90 PID 348 wrote to memory of 2300 348 cmd.exe 90 PID 348 wrote to memory of 2300 348 cmd.exe 90 PID 1816 wrote to memory of 440 1816 cmd.exe 91 PID 1816 wrote to memory of 440 1816 cmd.exe 91 PID 1816 wrote to memory of 440 1816 cmd.exe 91 PID 4304 wrote to memory of 2412 4304 WScript.exe 92 PID 4304 wrote to memory of 2412 4304 WScript.exe 92 PID 4304 wrote to memory of 2412 4304 WScript.exe 92 PID 2412 wrote to memory of 5028 2412 cmd.exe 94 PID 2412 wrote to memory of 5028 2412 cmd.exe 94 PID 2412 wrote to memory of 5028 2412 cmd.exe 94 PID 440 wrote to memory of 1220 440 exiguvxrrb.mp3 95 PID 440 wrote to memory of 1220 440 exiguvxrrb.mp3 95 PID 440 wrote to memory of 1220 440 exiguvxrrb.mp3 95 PID 440 wrote to memory of 1220 440 exiguvxrrb.mp3 95 PID 440 wrote to memory of 1220 440 exiguvxrrb.mp3 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xcjj.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c exiguvxrrb.mp3 jujqdllgg.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\exiguvxrrb.mp3exiguvxrrb.mp3 jujqdllgg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:5028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58a003bad9c874ec8ddbcaaed55ba7546
SHA11763dd07680ff4d16974ce3b43c4eaf9b7e7e21a
SHA25651d2fbe41e9a933cb1e7265837d0b68b0956ac08d51cfd2a8aacedda2f2f8b0b
SHA51217709208964cbc9cfc2a28d9135002ffa7814c43255abedad10a92c2b86ee7469f1351b261461dc9cb1fc4a399c2f9268e77a3060b9990aa6db75b7e90df25d8
-
Filesize
540B
MD5de178a4a202c9888ed7a208c6a644149
SHA1d4892d8fcec4b1c57eca7223f4bbfb0506fd0d86
SHA25638d4b4ce2be0f554972ffb928dfebb173eff84fc06239378439e2c81a3d984fb
SHA5121843e3ea7c944c5b5b77404450cf7104d5ceb48790b94304f905a2c2af400c42749397e33687f3e4e203fdb1a62b07daa12b113c6377ac1ed085bdc8ee0fc661
-
Filesize
589B
MD543ab8138ddbc9794f1dce0a4ba6a4b77
SHA1f09c85ab35e3cae3bfbeee9ad8a82169112f9430
SHA2565282b99fdf8732d28c18c09e8e511d0ace18bf8beb3f3428fc689c3e4ffafee1
SHA512eefe38bfb89688f3bfe51119a6624c6b73229deedb14c9aed4eca81412117a7f971a64ef0dec85105ab4f1680433b53364652a324e6918c817c719d080b3316a
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
879KB
MD5ba3227a6a7e9aae129c0fb82bb511b95
SHA126985630ffdb7ca1caf18b4dd4edbb52a4c840be
SHA256829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762
SHA512ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef
-
Filesize
636B
MD57a4680111fe13184dded5fea94deab57
SHA14d49592817d53f9c5727b64ae51c485c8ce50e2d
SHA25697d2cf558bc2c88fe59361c97d4e0f1effe058507539db2817a22a68408ae539
SHA5125485a1c5f9fafadba68d91a4f87b742f392810c458d783d73646cc46a35074f8ca3b268eb6e7895ee1a6bcddfb9d5251be250c5ded25a57cb0df783641379728
-
Filesize
505B
MD59a7431dbadb74ce902f3badc0522cde9
SHA17de32340b63d9371a6df6ff3f527dd3718494507
SHA2561fe9e5fe9e421a044169446ebdc54d526f7ed7189e14b47425edf28fd0705973
SHA512e531547945bbc137ee0154bee4cec0ad83e7d6349e6492058b13845eab0aa98ff69b54fc02d3ae3d476d5f21f274c156b798733137dbe29469d087c2de706309
-
Filesize
543B
MD53f31479ce20169658fc0bece91baa21b
SHA1ac7a707272f9a133d2e2af767c5bb0dcafb856cc
SHA256f663efea5d17f2f90e06476dd0bd9aad18f5c90b9c6ecd022b7160fca4461157
SHA5120a768f29c6d8b2d1c182620636826b975bae75349e218a18cd2c0718602bd727946dc8840d03b567609f4889927365fd3b28f92d37b4588005e20cfbd24e4a88
-
Filesize
561B
MD5efe9dc4398235606e348de0013613184
SHA1e27eef54f971a81bdc9aea7d9f8c3a84aaa8ec17
SHA2560020a0b64c7d7a95332bdc6543570b22435b9c6527c272fd69482f110cd78c3b
SHA512e7b79ffa520e8b6e642d0db64393a451ded061c212fcd4a187825f5f841ecc16a28b167f653d0b150d368bbe717fa185df24a48acff4b91281da1655d7496b0c
-
Filesize
621B
MD511a0b4476265f1b9bd3bfc3cbcca409a
SHA1ee306624f25b60f575faded8aff91ff6e28b2e9b
SHA25639e19d90cfc180f1111493759da8332a33556e5f740304a8d93ff7eebe5821e0
SHA512ed7b19d4cc6acb124cccecc5d73e4fac8dda1fc8e742bd61a932ce97a7b9ede679ddcbaff3eb43c79137635ecc2a58fdb87eb25e0a7e8ba4e713f76d025538d6
-
Filesize
569B
MD589e312356ee07d906a15cc74b6232498
SHA18e0d8c1dbe8f98fa7a58a24eb06cec1230199591
SHA256a3257e955945f6e1fac689fe2efad79ec9511e54140b550b95f99bc849478205
SHA5121d296d08ea8b0962b6e067e47146746a4c2399868073b6beffbb85c359727aa3f2825e7807bcbdfbf75bcab07521d3eb0567a89c37d011d0088ad3f809cf3e15
-
Filesize
529B
MD5fad42d64e2ba33efc46ae738fb5b0a65
SHA16283fdad73c2e71f01653404a84cb04d6b1e72b6
SHA2561ff4a0f98969d45df0bb6aab8bd32fd9a5db6b2c3311687a6784340fe92deb3b
SHA51207d775a9801c5159b6b8d8c7c99f1dfc7db2757b6c195fef94f919301d4189c3ba99ab2f39e4de578661086bd51bfd9537e6df96b0f15b9532cc67a7f6c0b380
-
Filesize
525B
MD526d1ef03f059035062a953fe56189805
SHA124627042e99874582bf23a3cafbe84488dfddc2d
SHA256df23df9b0925d87f771fe30c4941968a7941d30e61fc095f5858859998e9a3a4
SHA5126373d740a7c2067b8a0f044f9a3b88a699a3024f0b3588efe97804f5ffee8d766737b616646fce37f15446396e82abb8bfb60bb0a5221b1b2f60f5a1e3cee931
-
Filesize
38KB
MD55a16abae8e2e76243cb64e663c433b7c
SHA133603c697a678d7de33337d4cc256823a757e370
SHA2560f3346373c8f156af575a6cf5fddea7a0591e9e98c55911da92c1d0247b42879
SHA512ae7b40466e076e3f5e134c144bcf0387376e8848290d500b1680fd815682a5cffe323385f382d191fc36f77fdc168062d02ea5085c440af95df6c9f21bf8aa58
-
Filesize
38KB
MD54ba1e3dd70b841631605154d0a873e12
SHA13822b13b2cc21b0e6eece2a369ce270711d34f09
SHA256c0463353430c226c83582d11c75816d54dc896e27ca9f6200571c90cbec7d156
SHA512abbaa2045a0eef1daa302e1fb4d241256293f52ade097d4076df7af9d77fe1c881fb21b87bb6b506f965af41b69f8db410c81f6c13688919a193cbd3416a14b5
-
Filesize
516B
MD5640f2177d9892474d0ac242c3667f3ff
SHA1e3de1e8744713f4c8eea3d22810caaf6b98a38d5
SHA2565370805ea5277af13d06cba90923f43f89ce71b307f1a5bc8713078d73fdcfae
SHA512b03300bc6e37b18f80a8028a6ce9efd76bc9d9475fbd3bd1226ef4aa746214254e896fc8ee979e34f0d626317c203e990a938b481c23346ee502e7481f872b60
-
Filesize
562B
MD5ff26772d011d610c7f4bdd0a05401831
SHA1023503721ab26a0266caac724b5ed945c6c44c3d
SHA25678f9d09766359845345936b969282547fba8a5d1a9153eb9f6b7832ca306941e
SHA51221ae9e92426494782594355582ba6c7bbce0fc741ba598570306b3bfc4b74a4df6d8cf18cd8e755230d42133598b9aa5ba2c5b3df94de302505b5649f2c10853
-
Filesize
541B
MD59d2a1420104961db5f6c3acdd78c5413
SHA1aed36a59b5e04e74dba7993108a3036bc0c4841c
SHA25668e829ee0130254050cebb8138bcf651453d4cc85267408c32536e549cd64797
SHA5127cbdf7ace371d7eed837b3a1f4fe3c4cb8a71b423fec30c3fd2868d7dac561c39f7eb15beea94ef67edc782210d3297f610e6e251401e6cbb8b0df6e702e31a2
-
Filesize
547B
MD57f669e5f6c40f60176941426b38c636f
SHA1ba19a13d936e2484091b034dec5a797f82fc0471
SHA256f806baf083a66ee897f8d9df01c94450cc497020fae845aee7a3ad9658de8bb6
SHA5126c021e4af83758c1d4e24537f40499c68499e36deca4bf052f6ad35ed4ebbc7bf7096f38f43478fd21a689cc4330f78662599c39a72ca9bd48ac7d1ab6205c66
-
Filesize
601B
MD574d3eb0b1855cd07983c292bb948d99d
SHA14697ee314d8ebebd7eac6c59a7448a61e409a64f
SHA2562d1e1cb356c1fc8dad4f704f2132e26c9d61aa6807c3663805cb3edffd54309d
SHA512bbd22f507e9c163df6d1c0806e72615d444615bcac0e2c726c40260e76f91ae3168dff74d86435a22c701cb2167e2a555340984608f3e60fd68bd0cc6f3bc7a9
-
Filesize
570B
MD516f8862470abc9bd3d5af4f6458a2c57
SHA1212d077a18d28b73fbf7df9d633159b22e627505
SHA25605b2d07b29ce1f6b110a3bb9232fc05cbd8f46e40318a18496a5c4f882388c4c
SHA512604cbff97d151d314c41e5da9a6ea5f5c8d6514713810e64dd3b085be3e46a6617284af838d5b15da1eeeb2d897528dc20d73b273ca53f9c4d96c3386809f3c7
-
Filesize
588B
MD5fdc0435dee47f452b76364dad3ff3851
SHA12c7e75bc1d2b2eeafaa17c60265d13143eb2a5db
SHA256ef71c9b03d4d8b03f39f052f46b37d89536f35427bce1104913c10da3b9c1fa1
SHA51235693775653fd90add369b4a811d10fe4cb621075347263b09560f0c7bfa93309de737f18a719f2339fd3830b312cc14c18062d2b80abcb74ae3ff57c229d274
-
Filesize
193KB
MD55020f5d94271ef49423393f311102b84
SHA165d7cafb647474b3278700253e453994c8c5c258
SHA256a43c103960d14ddba7698b76852aebde85546b01cb51fd309a05577ca89cb757
SHA5124c10f02f12e81ab055e8b6df8cc64e087be826db89b81ba3b8434f2a3d988d32e4ed5587d7dfc57d809ae75544c0f26462977afff569b7a49bb58bac2c9851bd
-
Filesize
510B
MD56db48d994592c7e89326e10e0534f02e
SHA1aa594bec5eba9cb186c30846c84fbf8d6ce88207
SHA25606e928e3cd0c3e5ba69009535950c5a9f2848f86b68341fadc05cd6d885f3daa
SHA512dcc67b7a13bc1ff78c88fc7ea3f774c57ea68c054cbe1bff9cf89fa412f0502999ebae57d635c28c42f549df04b5590444899910b143b4b1d90540e2642c5b66
-
Filesize
514B
MD5bd4f78f00044397b048515feac7d70f9
SHA14b1b749c5e6cabbee3f24518680302426eee6f5f
SHA2568ff5afb75964a740cddfdde8b059d4ea069ec44d4e11fc70824433a9a1830914
SHA5129f784e1e8f92e599ca9931916e7b909f4b18a4ded43b0712c231ced5351ae2b729f07f258e5d72c4e9f495a6cedf31204e2f1a98d0aa45f21e54f9312b8dee38
-
Filesize
568B
MD59130e3d39ad7a5a96b41bb801ebeb126
SHA185088abd1788bbd886ac37c3a4b4b6f13e2effa3
SHA256e37478a8080c9dc35926872ea64541b112bcd9406e48243c9794f95ce30327e0
SHA512eef4013e76613897c5b13ce536fd26e257b5f3086d80d32a9b77af3cfa90862dc40fbefba3021e4bd3dfb045500c49473b605e1517daf561f5a0e9bf4a3ac786
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b