Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2025 04:31
Static task
static1
Behavioral task
behavioral1
Sample
rELITETRADINGLL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rELITETRADINGLL.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
General
-
Target
rELITETRADINGLL.exe
-
Size
930KB
-
MD5
c730d2226304c997f5cc1124a9cfe6fc
-
SHA1
79e71e9efb193582619f93287202404d73348088
-
SHA256
e81747a9ede60d251a5cca15da28963fb84975bcbd4f6ff2bb96558639dfc9e6
-
SHA512
b19281c8bbe04847bd4000da0569f9c9aa05be60e8b29c12ab116f8fa352d120675db8c165b00315366e13e6a0b5d055c36620f2f51eea300dac80deadd71e68
-
SSDEEP
24576:FerYnK4TwIld1V20+FDbzUMX5gBb4J4MOqsk3UiFZ:FerYnKRIlHV20+FDbzhX5gOJ8TJiz
Malware Config
Extracted
remcos
odg-RemoteHost
odg01.is-a-landscaper.com:49950
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-GN5MV3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 55 3176 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2880 rELITETRADINGLL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Navngiven187 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Unweaned236\\Treehair.exe" rELITETRADINGLL.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3160 rELITETRADINGLL.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2880 rELITETRADINGLL.exe 3160 rELITETRADINGLL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rELITETRADINGLL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rELITETRADINGLL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4680 MicrosoftEdgeUpdate.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000300000001e734-21.dat nsis_installer_1 behavioral2/files/0x000300000001e734-21.dat nsis_installer_2 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2880 rELITETRADINGLL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3160 rELITETRADINGLL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3160 2880 rELITETRADINGLL.exe 89 PID 2880 wrote to memory of 3160 2880 rELITETRADINGLL.exe 89 PID 2880 wrote to memory of 3160 2880 rELITETRADINGLL.exe 89 PID 2880 wrote to memory of 3160 2880 rELITETRADINGLL.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\rELITETRADINGLL.exe"C:\Users\Admin\AppData\Local\Temp\rELITETRADINGLL.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\rELITETRADINGLL.exe"C:\Users\Admin\AppData\Local\Temp\rELITETRADINGLL.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk1NzI4MzU2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4680
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
930KB
MD5c730d2226304c997f5cc1124a9cfe6fc
SHA179e71e9efb193582619f93287202404d73348088
SHA256e81747a9ede60d251a5cca15da28963fb84975bcbd4f6ff2bb96558639dfc9e6
SHA512b19281c8bbe04847bd4000da0569f9c9aa05be60e8b29c12ab116f8fa352d120675db8c165b00315366e13e6a0b5d055c36620f2f51eea300dac80deadd71e68
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f