Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 17:31
Behavioral task
behavioral1
Sample
Order.exe
Resource
win10v2004-20250314-en
General
-
Target
Order.exe
-
Size
809KB
-
MD5
8849e2039f215fdc3d18270bff047810
-
SHA1
b5276ad1f216f5de3d2edccfa598a0eaf676821f
-
SHA256
ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
-
SHA512
4779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638
-
SSDEEP
24576:url6kD68JmlotQf4uvwKMXeDyEpyrX5WIYz8g3Q:Ml328U2yfxvwdgSrpkz3
Malware Config
Extracted
remcos
RemoteHost
196.251.86.41:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-83VOGC
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Countee.vbs Countee.exe -
Executes dropped EXE 1 IoCs
pid Process 4680 Countee.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1880-18-0x0000000000870000-0x0000000000A32000-memory.dmp autoit_exe behavioral1/memory/4680-40-0x0000000000BC0000-0x0000000000D82000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4680 set thread context of 2340 4680 Countee.exe 93 -
resource yara_rule behavioral1/memory/1880-0-0x0000000000870000-0x0000000000A32000-memory.dmp upx behavioral1/files/0x0012000000023e17-15.dat upx behavioral1/memory/4680-16-0x0000000000BC0000-0x0000000000D82000-memory.dmp upx behavioral1/memory/1880-18-0x0000000000870000-0x0000000000A32000-memory.dmp upx behavioral1/memory/4680-40-0x0000000000BC0000-0x0000000000D82000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Countee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4680 Countee.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1880 Order.exe 1880 Order.exe 4680 Countee.exe 4680 Countee.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1880 Order.exe 1880 Order.exe 4680 Countee.exe 4680 Countee.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4680 1880 Order.exe 91 PID 1880 wrote to memory of 4680 1880 Order.exe 91 PID 1880 wrote to memory of 4680 1880 Order.exe 91 PID 4680 wrote to memory of 2340 4680 Countee.exe 93 PID 4680 wrote to memory of 2340 4680 Countee.exe 93 PID 4680 wrote to memory of 2340 4680 Countee.exe 93 PID 4680 wrote to memory of 2340 4680 Countee.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\buncal\Countee.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD59eab34dfcce1ba574cd3c88067264665
SHA1d3026fb6a98e79973623f70690852873c757edbd
SHA25628397000c0779d42ee2fa6c29ddd5c635cdf206d5296979e68e11197801afaf7
SHA51279e6d2306b530de2bc8719b94947c3288e200661cf5bbeab0f65899cb5ccefcd753db76e03e41ae82dcbc709c008660ab9cd19c96b69fb8809b7a4b08c9bad25
-
Filesize
487KB
MD5975d2f3e250eac84b67dbb5d8442acbc
SHA110498c75e31dfe70f4b165eb415beafb3c882a09
SHA256b2bedca2b4226277849a88c0f3d965f022e40dad453549c6a2dff21813b5bf1c
SHA512a2f40be8299ed633bd551ddd0b4609ce1c526daa5176a3b2fddfb90f6720e5e70b0e57006b389a15b7ce4d8881d35fe42b0caad4a561347f6d9a28a0bdad130f
-
Filesize
809KB
MD58849e2039f215fdc3d18270bff047810
SHA1b5276ad1f216f5de3d2edccfa598a0eaf676821f
SHA256ad39a998b7f7b0889d74b2377b4ef09cb4827b314052e6280f2925bdc06ae248
SHA5124779f5586c928f606185418f1320a8255598a122018230e547053afea09971d6aee80273c75e0ba26facea459a315ee53325104f5cf689067f04135aad4d7638