Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 00:08
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Quotation.exe
Resource
win10v2004-20241007-en
General
-
Target
Quotation.exe
-
Size
1.0MB
-
MD5
508fba262804a1ec8d887868d2e8ee2c
-
SHA1
a909187e35e60749e4da331d37599e2a29fe2b7e
-
SHA256
91a4ae1e1acda298e513d45b389598a4e6561fe83f8db3d05c44bcb551c01a16
-
SHA512
d2d2c39a4068fb4b527fec0624f9b227c05d62f9e0636591ca73660fbc7809834b757d73ec9c92679e507f97eb5cbbbb8a842502eebe6bd565a05226d2ed00d4
-
SSDEEP
24576:7Odf+JAUM+bdGdzFpU3ZKA58wnTkdxNpSv8YCGJm:7yf+ZodzHU3ZK08dvNgvbCGJ
Malware Config
Extracted
remcos
RemoteHost
2.58.56.182:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GM05WY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 752 powershell.exe 2992 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Quotation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 1720 2524 Quotation.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2524 Quotation.exe 2524 Quotation.exe 2524 Quotation.exe 2524 Quotation.exe 2524 Quotation.exe 2524 Quotation.exe 2992 powershell.exe 752 powershell.exe 2524 Quotation.exe 2992 powershell.exe 752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 Quotation.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 752 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2524 wrote to memory of 752 2524 Quotation.exe 89 PID 2524 wrote to memory of 752 2524 Quotation.exe 89 PID 2524 wrote to memory of 752 2524 Quotation.exe 89 PID 2524 wrote to memory of 2992 2524 Quotation.exe 91 PID 2524 wrote to memory of 2992 2524 Quotation.exe 91 PID 2524 wrote to memory of 2992 2524 Quotation.exe 91 PID 2524 wrote to memory of 428 2524 Quotation.exe 93 PID 2524 wrote to memory of 428 2524 Quotation.exe 93 PID 2524 wrote to memory of 428 2524 Quotation.exe 93 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95 PID 2524 wrote to memory of 1720 2524 Quotation.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vFEnLODNRoht.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vFEnLODNRoht" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD9A7.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD505edce18a57ec2386433a90a25cd8976
SHA12f78db930f97d2dcfd785f4f1c31cd05dca55e09
SHA25604663f89a20d84a141abaec208ba77a1008effb75acc6fe7588c3c8f6212c75a
SHA512ee8e219d7e64ea0d81101110913570283f28ad691b7466b07329aaddebb84432aa2cc03008c47fae4d65bb101fd45e2758e4b25e88f0e1e5ac73c453559c893c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5619f205247b94b8b663d88706b6f9b8e
SHA1aa5a8a4570eb8e81a8bfad40b0391d2c9c488213
SHA2568f3ad68bf8509ab59b19419075c3a4f8d804776e0830fe986761458ab7279248
SHA51255ec342276f7c8b5ab149c944114339c17910d68c75db93db944ec4a697e17d98d43fd03b00d6572cdbd1d5c34655cfcba5e39dd23e89d0e86faa1d172fe914b