Analysis
-
max time kernel
154s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 22:41
Static task
static1
Behavioral task
behavioral1
Sample
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe
Resource
win10-en-20211208
General
-
Target
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe
-
Size
612KB
-
MD5
faf84fc2be4d40feddf6856c3cf91483
-
SHA1
ede65d5360d7e47e190f7285e013a2d29490f8c5
-
SHA256
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade
-
SHA512
e5ce499dade9c3c8cece4e87b694dc1473bad47071bd103a5b8a9b97d465bc01444c7d62d0542d0ccd662b8054a2885dd155fdf8d59019a02802daee31195468
Malware Config
Extracted
remcos
RemoteHost
185.105.236.179:1952
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-R7TDQD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Extracted
remcos
2.5.0 Pro
RemoteHost
185.105.236.179:1952
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-R7TDQD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
remcos.exeremcos.exepid process 1868 remcos.exe 1336 remcos.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1448 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exeremcos.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exeremcos.exedescription pid process target process PID 1648 set thread context of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1868 set thread context of 1336 1868 remcos.exe remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 1336 remcos.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exeWScript.execmd.exeremcos.exedescription pid process target process PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 1648 wrote to memory of 436 1648 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe PID 436 wrote to memory of 1532 436 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe WScript.exe PID 436 wrote to memory of 1532 436 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe WScript.exe PID 436 wrote to memory of 1532 436 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe WScript.exe PID 436 wrote to memory of 1532 436 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe WScript.exe PID 1532 wrote to memory of 1448 1532 WScript.exe cmd.exe PID 1532 wrote to memory of 1448 1532 WScript.exe cmd.exe PID 1532 wrote to memory of 1448 1532 WScript.exe cmd.exe PID 1532 wrote to memory of 1448 1532 WScript.exe cmd.exe PID 1448 wrote to memory of 1868 1448 cmd.exe remcos.exe PID 1448 wrote to memory of 1868 1448 cmd.exe remcos.exe PID 1448 wrote to memory of 1868 1448 cmd.exe remcos.exe PID 1448 wrote to memory of 1868 1448 cmd.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe PID 1868 wrote to memory of 1336 1868 remcos.exe remcos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe"C:\Users\Admin\AppData\Local\Temp\02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe"C:\Users\Admin\AppData\Local\Temp\02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
ff449f6f7bc5e2d800eb30e2d2c56611
SHA193419ea805b9ce35a766e5c56db50d54c2d3f94b
SHA256655787cf79040ee701963986320556a834d6345e850e03653e4852d94eb09416
SHA51202a17064c837d36ba241fb8edf9266e33479a10eb8652b974158a3227878a801da29db1108413bb2c298a105b3c19bd20c3a3100f19444189f434706825766a6
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
faf84fc2be4d40feddf6856c3cf91483
SHA1ede65d5360d7e47e190f7285e013a2d29490f8c5
SHA25602f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade
SHA512e5ce499dade9c3c8cece4e87b694dc1473bad47071bd103a5b8a9b97d465bc01444c7d62d0542d0ccd662b8054a2885dd155fdf8d59019a02802daee31195468
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
faf84fc2be4d40feddf6856c3cf91483
SHA1ede65d5360d7e47e190f7285e013a2d29490f8c5
SHA25602f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade
SHA512e5ce499dade9c3c8cece4e87b694dc1473bad47071bd103a5b8a9b97d465bc01444c7d62d0542d0ccd662b8054a2885dd155fdf8d59019a02802daee31195468
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
faf84fc2be4d40feddf6856c3cf91483
SHA1ede65d5360d7e47e190f7285e013a2d29490f8c5
SHA25602f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade
SHA512e5ce499dade9c3c8cece4e87b694dc1473bad47071bd103a5b8a9b97d465bc01444c7d62d0542d0ccd662b8054a2885dd155fdf8d59019a02802daee31195468
-
\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
faf84fc2be4d40feddf6856c3cf91483
SHA1ede65d5360d7e47e190f7285e013a2d29490f8c5
SHA25602f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade
SHA512e5ce499dade9c3c8cece4e87b694dc1473bad47071bd103a5b8a9b97d465bc01444c7d62d0542d0ccd662b8054a2885dd155fdf8d59019a02802daee31195468
-
memory/436-59-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-56-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-62-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/436-61-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-63-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-67-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-72-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-60-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-58-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/436-57-0x0000000000080000-0x00000000000A0000-memory.dmpFilesize
128KB
-
memory/1336-89-0x0000000000400000-0x0000000000610000-memory.dmpFilesize
2.1MB
-
memory/1336-90-0x0000000000400000-0x0000000000610000-memory.dmpFilesize
2.1MB
-
memory/1648-54-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB
-
memory/1648-55-0x0000000002130000-0x0000000002131000-memory.dmpFilesize
4KB
-
memory/1868-79-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB