Analysis
-
max time kernel
2s -
max time network
4s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17/02/2025, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
Windows_Security_Patch_KB5021130.exe
Resource
win10ltsc2021-20250211-en
General
-
Target
Windows_Security_Patch_KB5021130.exe
-
Size
618KB
-
MD5
4b7cb7621606abd6ffb6d38bafafb8e9
-
SHA1
831c1c044cdf6515ce3444444242015e8b52271f
-
SHA256
1744bcc45c4af593d5f3a72c972bc86d1158fb3408fe03db2d80d28b2c51d7c8
-
SHA512
98437691db7c50e50ece2de7caffddfe6a5bcb17af69754377bfbb195865a1362df6e911dfd6b7c9ebb17f98fae27c743a8518dc9348bcc10962f53e87e89d3a
-
SSDEEP
12288:BrtxWWIHuw2W41RfGx6UL7Uhd9BKcaQID8G3e3JgFaX:BanHubW4DfGUtKcadQ3JO0
Malware Config
Extracted
remcos
googlegroupaccount2
107.174.65.146:1194
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
googlegroupaccount.exe
-
copy_folder
googlegroupaccount
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
googlegroupaccount
-
mouse_option
false
-
mutex
Rmc-3UY7X7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4608 set thread context of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2144 2480 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows_Security_Patch_KB5021130.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83 PID 4608 wrote to memory of 2480 4608 Windows_Security_Patch_KB5021130.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"C:\Users\Admin\AppData\Local\Temp\Windows_Security_Patch_KB5021130.exe"2⤵PID:2480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 5483⤵
- Program crash
PID:2144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2480 -ip 24801⤵PID:3820