Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 02:27
Static task
static1
Behavioral task
behavioral1
Sample
365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe
Resource
win10v2004-20241007-en
General
-
Target
365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe
-
Size
1.9MB
-
MD5
9c14de2917293f81b23b0cde00ddc624
-
SHA1
0baa9c81a415a4d4d72305f71490ca32816c63a1
-
SHA256
365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed
-
SHA512
c4145d85bbe7b5414009ebfe2a04242d872623c5133f4e5da9fe8c27b0742349e51d80434ed1abceda4ed21776d37437fc39d74c67abd5daf4f546e2c98e29cb
-
SSDEEP
49152:kDjlabwz9E7lIyIp6GVn+8OzCHGV4wUhCDOs:0qw8lIyIpd+8wlUrs
Malware Config
Extracted
remcos
RemoteHost
185.42.12.75:2406
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
010325
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
010325-YWFFXL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2840 palemoon.exe 2624 palemoon.exe -
Loads dropped DLL 10 IoCs
pid Process 2840 palemoon.exe 2840 palemoon.exe 2840 palemoon.exe 2840 palemoon.exe 2624 palemoon.exe 2624 palemoon.exe 2624 palemoon.exe 1588 cmd.exe 1588 cmd.exe 2628 Iu_alt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 1588 2624 palemoon.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language palemoon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language palemoon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iu_alt.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2840 palemoon.exe 2624 palemoon.exe 2624 palemoon.exe 1588 cmd.exe 1588 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2624 palemoon.exe 1588 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 Iu_alt.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2840 2260 365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe 31 PID 2260 wrote to memory of 2840 2260 365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe 31 PID 2260 wrote to memory of 2840 2260 365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe 31 PID 2260 wrote to memory of 2840 2260 365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe 31 PID 2840 wrote to memory of 2624 2840 palemoon.exe 32 PID 2840 wrote to memory of 2624 2840 palemoon.exe 32 PID 2840 wrote to memory of 2624 2840 palemoon.exe 32 PID 2840 wrote to memory of 2624 2840 palemoon.exe 32 PID 2624 wrote to memory of 1588 2624 palemoon.exe 33 PID 2624 wrote to memory of 1588 2624 palemoon.exe 33 PID 2624 wrote to memory of 1588 2624 palemoon.exe 33 PID 2624 wrote to memory of 1588 2624 palemoon.exe 33 PID 2624 wrote to memory of 1588 2624 palemoon.exe 33 PID 1588 wrote to memory of 2628 1588 cmd.exe 35 PID 1588 wrote to memory of 2628 1588 cmd.exe 35 PID 1588 wrote to memory of 2628 1588 cmd.exe 35 PID 1588 wrote to memory of 2628 1588 cmd.exe 35 PID 1588 wrote to memory of 2628 1588 cmd.exe 35 PID 1588 wrote to memory of 2628 1588 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe"C:\Users\Admin\AppData\Local\Temp\365695a8882615e0e1f85b8477bb82212783b1ef3672f67a8ca92bc252ec11ed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\palemoon.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\palemoon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\YGH_local_v3\palemoon.exeC:\Users\Admin\AppData\Roaming\YGH_local_v3\palemoon.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Iu_alt.exeC:\Users\Admin\AppData\Local\Temp\Iu_alt.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD5ff877a5dffd764197250bd4ba28496b1
SHA1187b8e183fc3331dd4ba139333886ad1fbf333a7
SHA25683f935454ae8e450b6f042509ecf28cceff95edb2495c63a782b9d45c2eaf1c0
SHA512b9245353f8a8bce6f443345daf50e135aa9d84bcce4dc5fd9279216b99bc6a1fa409292e110132ad815f303f36006610d6907e9fc778e94977beb2332481d03d
-
Filesize
78KB
MD51e6e97d60d411a2dee8964d3d05adb15
SHA10a2fe6ec6b6675c44998c282dbb1cd8787612faf
SHA2568598940e498271b542f2c04998626aa680f2172d0ff4f8dbd4ffec1a196540f9
SHA5123f7d79079c57786051a2f7facfb1046188049e831f12b549609a8f152664678ee35ad54d1fff4447428b6f76bea1c7ca88fa96aab395a560c6ec598344fcc7fa
-
Filesize
51KB
MD5e7c55fe5699bc12b05b282b124004af6
SHA18129400217b856e5d0384bb5a55d323a1739bc18
SHA256fa3ee614bf7a6f2b7ce7ed031592f1b35e0a64fec38bd5980b49f130f6573843
SHA51213b35f0139fccb84de8616a6d905ef96b54c5567cd17666e1c32405c7d22cd8ba0b293feca018e987fdb368bb77ec2547f913a53cf30f2a39722c9419f1c0b7b
-
Filesize
184KB
MD50675804214addd18dd5e8dfadcda6e81
SHA12c998bbe2f7e2ef8163237eff3e0838ecadf69e5
SHA256734093544d7cec4d6e8c3e9bb4870d5e2b4ff0782cb079bb71e8a9ae9b373c18
SHA5122472d0deb97bbbcc0642784ce5f2050e57fd94ef9150e79b3c098ed39ae1ef6911fad092e876cfd5a7b73604299b7c5ac89b145e33bc024ccf54c044161d6466
-
Filesize
275KB
MD5b2d4b1d83945b5787d49a86c4f394e0c
SHA1334a5c434e5d5d0649f8224e449ca9aaf9ba6816
SHA256038d7b257b98421ad371189cf51d67f32ddad2de687c443a59ea74e4027bbf04
SHA5124e92c367991a30d81a718ef26e8e61d24a84d2b54b5d9c6555f319b186ed5bc29d03fb10929bdae4d37c4fe92b3c0be63ee1ed4b287df74af7644e65053222d5
-
Filesize
1.1MB
MD52a2c6b76e22cedd030f8b900a87989df
SHA1c5b785874fd5648de199cce7b678ed400d612e9e
SHA2565cc242ecbda1996179449fc89c228f32bc8e41a7e9d4de0afb443c79e00b9b35
SHA512ee134ec1c78ef168027dbc4afc3e98b8976bc77d16727629f58954adf5e6e5cbbd33f73e6710a3ab5959f7e3c19197dbce2db6581da6240a6d06e0fcfc12891a
-
Filesize
1.6MB
MD599c0bcbfa183e33e040360ea9d146ed5
SHA1ae2dee514720b567bfe133bf51ec078fef48f0b2
SHA256ecbedad22324a7efe08dbffa87ba3262985a5017cddb253596f7c39c1d653223
SHA512e5876ea7cd56c5cd73cbaa381b88ac6bc0491738f57c2357c1409c59750753d43bc2672557fba09a4926c2d06f1b540692bfa7ed1c2d22f45d2b90e6cfb38214
-
Filesize
433KB
MD5fea067901f48a5f1faf7ca3b373f1a8f
SHA1e8abe0deb87de9fe3bb3a611234584e9a9b17cce
SHA256bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152
SHA51207c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023