Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 03:52
Behavioral task
behavioral1
Sample
0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe
Resource
win10v2004-20241007-en
General
-
Target
0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe
-
Size
197KB
-
MD5
d09d4257ff23549630551efa8585be53
-
SHA1
dd0e7ce59459ca4362a8d5f94defa2929dc086c3
-
SHA256
0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca
-
SHA512
a3a61843b3885045a3b390dcbe0202e3bea90c67c05c1713de2afab979c66bdfb4a6edc7f60cb253a82552cbbf42dba68305f587a14f9cc15a8773a12f0ac9e5
-
SSDEEP
6144:WE0b2IzkAXQ7LPJAWhYDjhsqS2PmpCXY1xTrGhj1boS:WE0qQkpTesYDtkpCXY19rGh1boS
Malware Config
Extracted
remcos
5.1.3 Light
RemoteHost
127.0.0.1:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7WZ0G2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
resource yara_rule behavioral1/memory/2732-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-1-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-2-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-3-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-4-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-5-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-6-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-7-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-8-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-9-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-10-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-11-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-12-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-13-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-14-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2732-15-0x0000000000400000-0x000000000047E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2732 0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe"C:\Users\Admin\AppData\Local\Temp\0f8123df7cf3d74e9bef7c70c010b17176c90c338a39be5aa0e14d10adb4bbca.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732