Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe
Resource
win10v2004-20220812-en
General
-
Target
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe
-
Size
893KB
-
MD5
e62c6746f84f89027d8924786fbe3280
-
SHA1
1b5c55ebe31f1588d0d677e81d68bb11a48be894
-
SHA256
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f
-
SHA512
4233989e6594ab17d20d2d9b7397552e652028ab99b081fde885067904d0e949e564a5d9131dcd5a4b2a2cc3573437047dc29d0bfb385e88b8685f203001cb99
-
SSDEEP
12288:qBtwEru0VeNlhjfdF+/gKzfYIPI/Lj9tjAYpGo9pIt+9Hc+S2VLgxVQFt9M6sDPE:qNolhRczxILj3AVoIF2h+Cnbs7E
Malware Config
Extracted
remcos
3.1.0 Pro
RemoteHost
berryttttiere.duckdns.org:6553
asddskfjjer.duckdns.org:6553
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-Q3VG56
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
remcos.exeremcos.exepid process 1008 remcos.exe 1252 remcos.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1072 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exeremcos.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exeremcos.exedescription pid process target process PID 896 set thread context of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 1008 set thread context of 1252 1008 remcos.exe remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 1252 remcos.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exeWScript.execmd.exeremcos.exeremcos.exedescription pid process target process PID 896 wrote to memory of 840 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe schtasks.exe PID 896 wrote to memory of 840 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe schtasks.exe PID 896 wrote to memory of 840 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe schtasks.exe PID 896 wrote to memory of 840 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe schtasks.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 896 wrote to memory of 1284 896 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe PID 1284 wrote to memory of 700 1284 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe WScript.exe PID 1284 wrote to memory of 700 1284 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe WScript.exe PID 1284 wrote to memory of 700 1284 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe WScript.exe PID 1284 wrote to memory of 700 1284 1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe WScript.exe PID 700 wrote to memory of 1072 700 WScript.exe cmd.exe PID 700 wrote to memory of 1072 700 WScript.exe cmd.exe PID 700 wrote to memory of 1072 700 WScript.exe cmd.exe PID 700 wrote to memory of 1072 700 WScript.exe cmd.exe PID 1072 wrote to memory of 1008 1072 cmd.exe remcos.exe PID 1072 wrote to memory of 1008 1072 cmd.exe remcos.exe PID 1072 wrote to memory of 1008 1072 cmd.exe remcos.exe PID 1072 wrote to memory of 1008 1072 cmd.exe remcos.exe PID 1008 wrote to memory of 816 1008 remcos.exe schtasks.exe PID 1008 wrote to memory of 816 1008 remcos.exe schtasks.exe PID 1008 wrote to memory of 816 1008 remcos.exe schtasks.exe PID 1008 wrote to memory of 816 1008 remcos.exe schtasks.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1008 wrote to memory of 1252 1008 remcos.exe remcos.exe PID 1252 wrote to memory of 924 1252 remcos.exe svchost.exe PID 1252 wrote to memory of 924 1252 remcos.exe svchost.exe PID 1252 wrote to memory of 924 1252 remcos.exe svchost.exe PID 1252 wrote to memory of 924 1252 remcos.exe svchost.exe PID 1252 wrote to memory of 924 1252 remcos.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe"C:\Users\Admin\AppData\Local\Temp\1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wOqvUC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFDC0.tmp"2⤵
- Creates scheduled task(s)
PID:840 -
C:\Users\Admin\AppData\Local\Temp\1dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeC:\Users\Admin\AppData\Roaming\Remcos\remcos.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wOqvUC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB904.tmp"6⤵
- Creates scheduled task(s)
PID:816 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"{path}"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe7⤵PID:924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418B
MD5b92d64fe5b1d1f59df4b738262aea8df
SHA1c8fb1981759c2d9bb2ec91b705985fba5fc7af63
SHA256fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a
SHA5122566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2
-
Filesize
1KB
MD587236de8ae51d05fd90fe89fe7cc8dd2
SHA1f80f46a1ada8c499a7a325bf4164e2c802b25976
SHA256ab583c4cc17d81d1e94e21d5db116ccb6529153111dd9d75059c38b586634a2c
SHA512dae56cb8d34865abad73801f1b1a6fd14a0183e9eecc40dbe55e1c93ce81858ecab6133053c286a2b15ccbcce0b7470ca1b444e0a96a5fdd25073600e776f9ab
-
Filesize
1KB
MD587236de8ae51d05fd90fe89fe7cc8dd2
SHA1f80f46a1ada8c499a7a325bf4164e2c802b25976
SHA256ab583c4cc17d81d1e94e21d5db116ccb6529153111dd9d75059c38b586634a2c
SHA512dae56cb8d34865abad73801f1b1a6fd14a0183e9eecc40dbe55e1c93ce81858ecab6133053c286a2b15ccbcce0b7470ca1b444e0a96a5fdd25073600e776f9ab
-
Filesize
893KB
MD5e62c6746f84f89027d8924786fbe3280
SHA11b5c55ebe31f1588d0d677e81d68bb11a48be894
SHA2561dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f
SHA5124233989e6594ab17d20d2d9b7397552e652028ab99b081fde885067904d0e949e564a5d9131dcd5a4b2a2cc3573437047dc29d0bfb385e88b8685f203001cb99
-
Filesize
893KB
MD5e62c6746f84f89027d8924786fbe3280
SHA11b5c55ebe31f1588d0d677e81d68bb11a48be894
SHA2561dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f
SHA5124233989e6594ab17d20d2d9b7397552e652028ab99b081fde885067904d0e949e564a5d9131dcd5a4b2a2cc3573437047dc29d0bfb385e88b8685f203001cb99
-
Filesize
893KB
MD5e62c6746f84f89027d8924786fbe3280
SHA11b5c55ebe31f1588d0d677e81d68bb11a48be894
SHA2561dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f
SHA5124233989e6594ab17d20d2d9b7397552e652028ab99b081fde885067904d0e949e564a5d9131dcd5a4b2a2cc3573437047dc29d0bfb385e88b8685f203001cb99
-
Filesize
893KB
MD5e62c6746f84f89027d8924786fbe3280
SHA11b5c55ebe31f1588d0d677e81d68bb11a48be894
SHA2561dacdded73c4cf1270303e47ce3f12a5acdf7881eea7487231115e2be20aea5f
SHA5124233989e6594ab17d20d2d9b7397552e652028ab99b081fde885067904d0e949e564a5d9131dcd5a4b2a2cc3573437047dc29d0bfb385e88b8685f203001cb99