Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 14:43
Static task
static1
Behavioral task
behavioral1
Sample
Vendor Questionnaire and EOI.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Vendor Questionnaire and EOI.exe
Resource
win10v2004-20250129-en
General
-
Target
Vendor Questionnaire and EOI.exe
-
Size
610KB
-
MD5
d0627ad0019378cd5a6f23eb4a0f1c8f
-
SHA1
9626f6c80883b8203b299a1d751e136bf5e16e54
-
SHA256
f9a75f67ab3b4e7fa308bdac0ab7a6c40f0189fb3d95cfdb455023080a89c517
-
SHA512
8b6a2d8c71a2232f07c17d6e1e67e34945cbf08dad2426112ace21c4d808fdbf05adc44e78be742067130255af819d97cae93bf3c68f05da5c88777b6a8bbdd8
-
SSDEEP
12288:p98UWQxHvxTMN0X4YcXGw9CIOmUwuTRQXgz3sK7hvhO7G:paQxG3YWGkCIhUwuTRQwrl9e
Malware Config
Extracted
remcos
googlegroupaccount
107.174.65.146:1194
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
googlegroupaccount.exe
-
copy_folder
googlegroupaccount
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%Temp%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-1MDOQC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4860 set thread context of 4444 4860 Vendor Questionnaire and EOI.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1728 4444 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vendor Questionnaire and EOI.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85 PID 4860 wrote to memory of 4444 4860 Vendor Questionnaire and EOI.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vendor Questionnaire and EOI.exe"C:\Users\Admin\AppData\Local\Temp\Vendor Questionnaire and EOI.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Vendor Questionnaire and EOI.exe"C:\Users\Admin\AppData\Local\Temp\Vendor Questionnaire and EOI.exe"2⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 5123⤵
- Program crash
PID:1728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4444 -ip 44441⤵PID:4788