Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
Air Waybill no 6979374150.jpg.exe
Resource
win10v2004-20250314-en
General
-
Target
Air Waybill no 6979374150.jpg.exe
-
Size
1.2MB
-
MD5
b0c5db5da6ddac16b5e0d10541b490c9
-
SHA1
4f5ce083d1cddf3accc4546aff8f1947398d25ab
-
SHA256
ba07a481a7e8a35c8b0f80de7ceb81307f0efd284656bece481aa4ac4e088af9
-
SHA512
2993c8d5dfd695771007048bef14e1a9ead4106d7a438a1a934b5af8439263448092aab6fda3f9b0976e4523a106ba52615adfda7afd8dea22d91a7f863081b7
-
SSDEEP
24576:eu6J33O0c+JY5UZ+XC0kGso6Fa2B5P6q0yg9nd7kRMdXWY:wu0c++OCvkGs9Fa2L6q+d6Y
Malware Config
Extracted
remcos
RemoteHost
103.83.87.190:5817
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-E1OC2H
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Vevina.vbs Vevina.exe -
Executes dropped EXE 1 IoCs
pid Process 5768 Vevina.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000223cd-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5768 set thread context of 4712 5768 Vevina.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Air Waybill no 6979374150.jpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vevina.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5768 Vevina.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4712 svchost.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4712 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3952 wrote to memory of 5768 3952 Air Waybill no 6979374150.jpg.exe 88 PID 3952 wrote to memory of 5768 3952 Air Waybill no 6979374150.jpg.exe 88 PID 3952 wrote to memory of 5768 3952 Air Waybill no 6979374150.jpg.exe 88 PID 5768 wrote to memory of 4712 5768 Vevina.exe 91 PID 5768 wrote to memory of 4712 5768 Vevina.exe 91 PID 5768 wrote to memory of 4712 5768 Vevina.exe 91 PID 5768 wrote to memory of 4712 5768 Vevina.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Air Waybill no 6979374150.jpg.exe"C:\Users\Admin\AppData\Local\Temp\Air Waybill no 6979374150.jpg.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\bothsided\Vevina.exe"C:\Users\Admin\AppData\Local\Temp\Air Waybill no 6979374150.jpg.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5768 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Air Waybill no 6979374150.jpg.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b0c5db5da6ddac16b5e0d10541b490c9
SHA14f5ce083d1cddf3accc4546aff8f1947398d25ab
SHA256ba07a481a7e8a35c8b0f80de7ceb81307f0efd284656bece481aa4ac4e088af9
SHA5122993c8d5dfd695771007048bef14e1a9ead4106d7a438a1a934b5af8439263448092aab6fda3f9b0976e4523a106ba52615adfda7afd8dea22d91a7f863081b7