Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 13:31
Static task
static1
Behavioral task
behavioral1
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win10v2004-20241007-en
General
-
Target
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
-
Size
4.8MB
-
MD5
db497afaaa939e9bd7706520873de8c7
-
SHA1
9a032838d8587bd1e039220bb1bbe28b1c569ea5
-
SHA256
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588
-
SHA512
a872f202d114739d2c8dbcafafdf88191adf6a3df51ab36c595371ab0b0343d3e8a838b07443f58d2d36251de8c027ad46a642317132bb5f088a70842b4f7959
-
SSDEEP
98304:0qwXy+as4+EAF3bgrYIseiqvGyS0Z4VeNzXrCAuO9X2egv+qvDfLdYEnrQtp:0qw1VFkrOeXGt24VezXr1y+4DjdBnEX
Malware Config
Extracted
remcos
RemoteHost
185.42.12.75:2406
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
010325
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
010325-YWFFXL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2696 iScrPaint.exe 1152 iScrPaint.exe -
Loads dropped DLL 7 IoCs
pid Process 2696 iScrPaint.exe 2696 iScrPaint.exe 2696 iScrPaint.exe 1152 iScrPaint.exe 2692 cmd.exe 2692 cmd.exe 1536 WizardManage.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 2692 1152 iScrPaint.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WizardManage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2696 iScrPaint.exe 1152 iScrPaint.exe 1152 iScrPaint.exe 2692 cmd.exe 2692 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1152 iScrPaint.exe 2692 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 WizardManage.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2696 2972 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 31 PID 2972 wrote to memory of 2696 2972 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 31 PID 2972 wrote to memory of 2696 2972 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 31 PID 2972 wrote to memory of 2696 2972 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 31 PID 2696 wrote to memory of 1152 2696 iScrPaint.exe 32 PID 2696 wrote to memory of 1152 2696 iScrPaint.exe 32 PID 2696 wrote to memory of 1152 2696 iScrPaint.exe 32 PID 2696 wrote to memory of 1152 2696 iScrPaint.exe 32 PID 1152 wrote to memory of 2692 1152 iScrPaint.exe 33 PID 1152 wrote to memory of 2692 1152 iScrPaint.exe 33 PID 1152 wrote to memory of 2692 1152 iScrPaint.exe 33 PID 1152 wrote to memory of 2692 1152 iScrPaint.exe 33 PID 1152 wrote to memory of 2692 1152 iScrPaint.exe 33 PID 2692 wrote to memory of 1536 2692 cmd.exe 35 PID 2692 wrote to memory of 1536 2692 cmd.exe 35 PID 2692 wrote to memory of 1536 2692 cmd.exe 35 PID 2692 wrote to memory of 1536 2692 cmd.exe 35 PID 2692 wrote to memory of 1536 2692 cmd.exe 35 PID 2692 wrote to memory of 1536 2692 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exeC:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\WizardManage.exeC:\Users\Admin\AppData\Local\Temp\WizardManage.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1536
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD56c1f62d8fc49a7537c3690f7c420b89d
SHA129de3dc820b2ee1fbcfe5dfa417fdb5f1a5f3a9c
SHA2565013320be9bc082cf6d9a4cf70929b38fe3ca95f4a6a8393f272d93a4a9966db
SHA512dae8363bb3788b9165c18d638ce44addbb3a901c21b5b3892672ea8ad14cae9fd2fb56c818400c6b658252f9e6ba52534d0e1f09b6cd3c9a88e61386948347fa
-
Filesize
1.8MB
MD5098ac4621ee0e855e0710710736c2955
SHA1ce7b88657c3449d5d05591314aaa43bd3e32bdaa
SHA25646afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
SHA5123042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
Filesize
40KB
MD56de7326216218b8195340d815dc75262
SHA1017f3895b98d9ed7ec02bc66945ec37aaed999e0
SHA2563a021200937a56e8dad94ffa8ac24fbbe55d318e64fce36a61efe115f9de3653
SHA5120060c2bf8c47ef5eb23abc4b63c597704501cc1dad2c9977e5e50a42d965ec99b7dcb54f14fbcc472e372f5d707d6bb075ff0e5edd0e72001c7dac58d5eaec57
-
Filesize
1.1MB
MD5c5ded003ddd953a1284dd2cfafd0e632
SHA1b3f974c9a9d035cc1ec990fba3ec5d12c5984073
SHA2563bb40e1fb837a6c138db1aa048c4ecfb51cb91e99e37c6fcbd41fc48b7948d60
SHA512ff7dea3773bebb92a6d92d2051b60fa428fc304ea24dbf66d44a6ae85bef4a1370899423997609eafd973ee8ffeb685ade27af0d42a6cc800aa573dfccc9c6d4
-
Filesize
433KB
MD5fea067901f48a5f1faf7ca3b373f1a8f
SHA1e8abe0deb87de9fe3bb3a611234584e9a9b17cce
SHA256bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152
SHA51207c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023
-
Filesize
1.6MB
MD5fc94b790582bdc5eeb15f9cd313346eb
SHA120b6e49f8c26722d29e5dc4c6d6875704364eece
SHA256d41dd393a6a8c4c53596f9ec5bd6797491951d6c9bae5105e523530e718e16c7
SHA512ede4e0f86aa2aad3cc332be96f1c75387d392608f6d0a5e540616d1cfe1a5e1d509b000d3ba460a076e7a4d49426dc7df26d65f4573736488168d3914182d47e