Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 14:16
Behavioral task
behavioral1
Sample
Order.exe
Resource
win10v2004-20250314-en
General
-
Target
Order.exe
-
Size
809KB
-
MD5
8849e2039f215fdc3d18270bff047810
-
SHA1
b5276ad1f216f5de3d2edccfa598a0eaf676821f
-
SHA256
ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
-
SHA512
4779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638
-
SSDEEP
24576:url6kD68JmlotQf4uvwKMXeDyEpyrX5WIYz8g3Q:Ml328U2yfxvwdgSrpkz3
Malware Config
Extracted
remcos
RemoteHost
196.251.86.41:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-83VOGC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Countee.vbs Countee.exe -
Executes dropped EXE 1 IoCs
pid Process 3824 Countee.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/5472-18-0x00000000004C0000-0x0000000000682000-memory.dmp autoit_exe behavioral1/memory/3824-43-0x0000000000B70000-0x0000000000D32000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3824 set thread context of 4580 3824 Countee.exe 92 -
resource yara_rule behavioral1/memory/5472-0-0x00000000004C0000-0x0000000000682000-memory.dmp upx behavioral1/files/0x000c0000000240f5-15.dat upx behavioral1/memory/3824-16-0x0000000000B70000-0x0000000000D32000-memory.dmp upx behavioral1/memory/5472-18-0x00000000004C0000-0x0000000000682000-memory.dmp upx behavioral1/memory/3824-43-0x0000000000B70000-0x0000000000D32000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4996 3824 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Countee.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3824 Countee.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5472 Order.exe 5472 Order.exe 3824 Countee.exe 3824 Countee.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 5472 Order.exe 5472 Order.exe 3824 Countee.exe 3824 Countee.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5472 wrote to memory of 3824 5472 Order.exe 91 PID 5472 wrote to memory of 3824 5472 Order.exe 91 PID 5472 wrote to memory of 3824 5472 Order.exe 91 PID 3824 wrote to memory of 4580 3824 Countee.exe 92 PID 3824 wrote to memory of 4580 3824 Countee.exe 92 PID 3824 wrote to memory of 4580 3824 Countee.exe 92 PID 3824 wrote to memory of 4580 3824 Countee.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5472 -
C:\Users\Admin\AppData\Local\buncal\Countee.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 6803⤵
- Program crash
PID:4996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3824 -ip 38241⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
809KB
MD58849e2039f215fdc3d18270bff047810
SHA1b5276ad1f216f5de3d2edccfa598a0eaf676821f
SHA256ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
SHA5124779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638