Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe
-
Size
1.2MB
-
MD5
dcb5272fb6c77d6d01c7db275d15abd4
-
SHA1
51baaaecd513d980f35d6d1b69d6aaf6b70d2abd
-
SHA256
cb807ebeb2e72b80110f7724a456c768daffd55adf65d45e3fe730e54b86559f
-
SHA512
7d148cd89504f5057ec538e7f2ed4556bc8a21d745f862fa4a22fd3de19dcf5503679a449a0da1a9c3bc795ea50b8ee5e08983c5ad3c194649088633d4391664
-
SSDEEP
24576:XNA3R5drX2nQNLS1wMxnybKAGxPHEgifT0u1h6LId7nT1RMwaMm3CfBomuFS:659LSSMnliT1h6LIdzTXM76fBoY
Malware Config
Extracted
remcos
2.5.0 Pro
NOVEMBER
behco.duckdns.org:2404
paris4real111.ddnsfree.com:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-VVJPTO
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 xaufkfr.bat 444 RegSvcs.exe -
Loads dropped DLL 5 IoCs
pid Process 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 2880 xaufkfr.bat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\47167307\\xaufkfr.bat C:\\Users\\Admin\\AppData\\Local\\Temp\\47167307\\xdpijumk.krc" xaufkfr.bat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 444 2880 xaufkfr.bat 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaufkfr.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat 2880 xaufkfr.bat -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1536 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe Token: SeShutdownPrivilege 1536 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 444 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2880 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 31 PID 1868 wrote to memory of 2880 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 31 PID 1868 wrote to memory of 2880 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 31 PID 1868 wrote to memory of 2880 1868 2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe 31 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 PID 2880 wrote to memory of 444 2880 xaufkfr.bat 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_dcb5272fb6c77d6d01c7db275d15abd4_black-basta_luca-stealer_metamorfo.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\47167307\xaufkfr.bat"C:\Users\Admin\AppData\Local\Temp\47167307\xaufkfr.bat" xdpijumk.krc2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:444
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5307a04f2922e9c811651cfc33c52875e
SHA1d8445f3b76ce1c8bb55d53d532179d2a5b819a88
SHA25602240258ec0b3ced3a58c3a46ff234afa58ed9ddb266ec5c9d0e1cfec3bdc404
SHA51279997d9379a463b5cbd7acf3e76df5008e9b327153beeb9537f1d8bbcbed05ac3c4451d138267024400117ba6ba38df5083518c2873a064101fa56f6656a59cc
-
Filesize
51B
MD5e0f27887e8d40c0b1d6eb6442a178faf
SHA1818f6e27825914ca64f7ccba9fb07ac14aff6bbb
SHA2561f9a1c3ad4f125d9795d4c194125b9f2325473ee32a0a599612367788975c18d
SHA51216c3b0e89d238cd0eac1de6687ba0d368f6c8b59440ba20beadf6d205b063ac611d548191e0e3652f9cd4888a1877eb852af855d8e053bf352a9fe7c4533b2b4
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215