Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 05:58
Behavioral task
behavioral1
Sample
rea.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rea.exe
Resource
win10v2004-20241007-en
General
-
Target
rea.exe
-
Size
469KB
-
MD5
29b622980bc32771d8cac127961b0ba5
-
SHA1
895a13abd7ef4f8e0ea9cc1526350eccf1934b27
-
SHA256
056cdf4a67164ded09385efec0912ccbb1c365c151d01b0a3633de1c4d410a18
-
SHA512
7410b6413f4177d44ad3b55652ca57e3d622c806e423286a3ae90dd8026edb3552d304fde3c2b82ee0b8ef3dc4ba0e4a185d0d03be96d9fa5f8be7347592db95
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSvn9:WiLJbpI7I2WhQqZ7v9
Malware Config
Extracted
remcos
RemoteHost
185.158.251.159:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TKL5S3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2388 2368 rea.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 rea.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2368 rea.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2388 2368 rea.exe 31 PID 2368 wrote to memory of 2388 2368 rea.exe 31 PID 2368 wrote to memory of 2388 2368 rea.exe 31 PID 2368 wrote to memory of 2388 2368 rea.exe 31 PID 2368 wrote to memory of 2388 2368 rea.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\rea.exe"C:\Users\Admin\AppData\Local\Temp\rea.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c898ddb9c473b3b021c9af9971a28b76
SHA10bbdae662adde04a25971e1f7ff491a332e19724
SHA256e8bfc698be2f362d1f5ca7f747c58f664db05cb046744c1ee7d70be853e6422a
SHA512c2d43c2f2cedf1d881668b10280475326a180645c9d7096ff9c7bc4243c174a8083ac870585cdb3cfd2dc41e2a6d0050bec384343c85ba1b5abe073e8605f9e0