Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 17:28
Behavioral task
behavioral1
Sample
Order.exe
Resource
win10v2004-20250314-en
General
-
Target
Order.exe
-
Size
809KB
-
MD5
8849e2039f215fdc3d18270bff047810
-
SHA1
b5276ad1f216f5de3d2edccfa598a0eaf676821f
-
SHA256
ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
-
SHA512
4779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638
-
SSDEEP
24576:url6kD68JmlotQf4uvwKMXeDyEpyrX5WIYz8g3Q:Ml328U2yfxvwdgSrpkz3
Malware Config
Extracted
remcos
RemoteHost
196.251.86.41:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-83VOGC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Countee.vbs Countee.exe -
Executes dropped EXE 2 IoCs
pid Process 2420 Countee.exe 4668 Countee.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/5244-19-0x0000000000FC0000-0x0000000001182000-memory.dmp autoit_exe behavioral1/memory/2420-37-0x0000000000B10000-0x0000000000CD2000-memory.dmp autoit_exe behavioral1/memory/4668-51-0x0000000000E50000-0x0000000001250000-memory.dmp autoit_exe behavioral1/memory/4668-55-0x0000000000B10000-0x0000000000CD2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 2272 4668 Countee.exe 95 -
resource yara_rule behavioral1/memory/5244-0-0x0000000000FC0000-0x0000000001182000-memory.dmp upx behavioral1/files/0x000b000000024143-15.dat upx behavioral1/memory/2420-16-0x0000000000B10000-0x0000000000CD2000-memory.dmp upx behavioral1/memory/5244-19-0x0000000000FC0000-0x0000000001182000-memory.dmp upx behavioral1/memory/2420-37-0x0000000000B10000-0x0000000000CD2000-memory.dmp upx behavioral1/memory/4668-55-0x0000000000B10000-0x0000000000CD2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Countee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Countee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2420 Countee.exe 4668 Countee.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 5244 Order.exe 5244 Order.exe 2420 Countee.exe 2420 Countee.exe 4668 Countee.exe 4668 Countee.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 5244 Order.exe 5244 Order.exe 2420 Countee.exe 2420 Countee.exe 4668 Countee.exe 4668 Countee.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5244 wrote to memory of 2420 5244 Order.exe 89 PID 5244 wrote to memory of 2420 5244 Order.exe 89 PID 5244 wrote to memory of 2420 5244 Order.exe 89 PID 2420 wrote to memory of 4532 2420 Countee.exe 90 PID 2420 wrote to memory of 4532 2420 Countee.exe 90 PID 2420 wrote to memory of 4532 2420 Countee.exe 90 PID 2420 wrote to memory of 4668 2420 Countee.exe 91 PID 2420 wrote to memory of 4668 2420 Countee.exe 91 PID 2420 wrote to memory of 4668 2420 Countee.exe 91 PID 4668 wrote to memory of 2272 4668 Countee.exe 95 PID 4668 wrote to memory of 2272 4668 Countee.exe 95 PID 4668 wrote to memory of 2272 4668 Countee.exe 95 PID 4668 wrote to memory of 2272 4668 Countee.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Users\Admin\AppData\Local\buncal\Countee.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\buncal\Countee.exe"C:\Users\Admin\AppData\Local\buncal\Countee.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\buncal\Countee.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD508eed95501e7bb01d7947ff940ae47b2
SHA10a47fef5afa8a99b29da818907d6d83a1695435f
SHA2569ce73c8c5ebc0700dd3ed95ef19628a7eacc2a26073e050e7aa583e5eb3a9f32
SHA512298a9f7b3a29fbdff46f7c12103bf8e0d627165cf01237b25307aab5f3ddeec9788622882fb8fe068edb7236c298c9f329c3173e490338c71c4bb75aaf35855f
-
Filesize
394KB
MD5d59b715ce6d8444b44ee42e421ce8bb2
SHA108a07b4f2e51482a0b6416ea9fa4e6bd3c58c288
SHA256179e9d58cf9805cb48a8dfa1d640584968ce920834620fec8cbcebb43c1ab9c4
SHA51283c4bbc265a481b25a1aa5c7e96f9a6875655ecb953179b3d2694d87c783cf6215a2a54c2812760891168df710ae10419630203478c50819fe68a54b75e7b959
-
Filesize
56KB
MD59eab34dfcce1ba574cd3c88067264665
SHA1d3026fb6a98e79973623f70690852873c757edbd
SHA25628397000c0779d42ee2fa6c29ddd5c635cdf206d5296979e68e11197801afaf7
SHA51279e6d2306b530de2bc8719b94947c3288e200661cf5bbeab0f65899cb5ccefcd753db76e03e41ae82dcbc709c008660ab9cd19c96b69fb8809b7a4b08c9bad25
-
Filesize
487KB
MD5975d2f3e250eac84b67dbb5d8442acbc
SHA110498c75e31dfe70f4b165eb415beafb3c882a09
SHA256b2bedca2b4226277849a88c0f3d965f022e40dad453549c6a2dff21813b5bf1c
SHA512a2f40be8299ed633bd551ddd0b4609ce1c526daa5176a3b2fddfb90f6720e5e70b0e57006b389a15b7ce4d8881d35fe42b0caad4a561347f6d9a28a0bdad130f
-
Filesize
809KB
MD58849e2039f215fdc3d18270bff047810
SHA1b5276ad1f216f5de3d2edccfa598a0eaf676821f
SHA256ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
SHA5124779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638