Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe
-
Size
729KB
-
MD5
c8e21020940ba49156c73340ddfa7c86
-
SHA1
7f84a4dcc45d658a805f042681c62b074e86fca0
-
SHA256
965845db528ea9bc4dbd24b1c6ea5495d771549bb9307955eaab3f021b0b9018
-
SHA512
cd7aa269a3d045d5b4488f0196ba1bdf24714af67c6c4c0b3ab78ba15b61f577dbfce4803dff0b155b6b7d728e7898a6eedf5939c7324c22f09c3a864822b759
-
SSDEEP
12288:b35GUP4TlEjG4BVFTUHO7fKHwqdgeOYUEqF/rApqTpB/37D:b35LPQO7FOcfKwsDUvOpqTpx7D
Malware Config
Extracted
remcos
Host-2
176.65.142.14:6060
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HM3EZ8
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Loads dropped DLL 2 IoCs
pid Process 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 drive.google.com 27 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1740 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 1740 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Aksiomers\mannoses.ini SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe File opened for modification C:\Program Files (x86)\retelegraph.htm SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Disambiguated.lnk SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1740 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 1740 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 93 PID 2728 wrote to memory of 1740 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 93 PID 2728 wrote to memory of 1740 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 93 PID 2728 wrote to memory of 1740 2728 SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.MalwareX-gen.10802.4830.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e23600029d1b09bdb1d422fb4e46f5a6
SHA15d64a2f6a257a98a689a3db9a087a0fd5f180096
SHA2567342b73593b3aa1b15e3731bfb1afd1961802a5c66343bac9a2c737ee94f4e38
SHA512c971f513142633ce0e6ec6a04c754a286da8016563dab368c3fac83aef81fa3e9df1003c4b63d00a46351a9d18eaa7ae7645caef172e5e1d6e29123ab864e7ac