Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 05:58
Behavioral task
behavioral1
Sample
rea.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rea.exe
Resource
win10v2004-20241007-en
General
-
Target
rea.exe
-
Size
469KB
-
MD5
29b622980bc32771d8cac127961b0ba5
-
SHA1
895a13abd7ef4f8e0ea9cc1526350eccf1934b27
-
SHA256
056cdf4a67164ded09385efec0912ccbb1c365c151d01b0a3633de1c4d410a18
-
SHA512
7410b6413f4177d44ad3b55652ca57e3d622c806e423286a3ae90dd8026edb3552d304fde3c2b82ee0b8ef3dc4ba0e4a185d0d03be96d9fa5f8be7347592db95
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSvn9:WiLJbpI7I2WhQqZ7v9
Malware Config
Extracted
remcos
RemoteHost
185.158.251.159:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TKL5S3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4240 set thread context of 2908 4240 rea.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rea.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4240 rea.exe 4240 rea.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4240 rea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2908 4240 rea.exe 83 PID 4240 wrote to memory of 2908 4240 rea.exe 83 PID 4240 wrote to memory of 2908 4240 rea.exe 83 PID 4240 wrote to memory of 2908 4240 rea.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\rea.exe"C:\Users\Admin\AppData\Local\Temp\rea.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"2⤵PID:2908
-