Behavioral task
behavioral1
Sample
42b468b52493a6d5e82d05e3dc3f779ecbbc3c2756ec1d571e61dd7aa77115cd.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
42b468b52493a6d5e82d05e3dc3f779ecbbc3c2756ec1d571e61dd7aa77115cd.exe
Resource
win10v2004-20230703-en
General
-
Target
9a87577ef09850111f4bf49ad89d4c6c.bin
-
Size
264KB
-
MD5
8d6f538319102e7a88ecd64016cf5c3a
-
SHA1
f4ce97acb6301793f557b445dcfaf7a8dcdf7e3a
-
SHA256
ab2acb750e83b98fdc88c12f04d7ada479cdd7117c90bf3b6f7f83011674d318
-
SHA512
0397788e7c1d78672e2a2dd363066bac343ca3107541debf9e43ffbd631f0ab5fe3336f5e35412b01800021ee01a6d35bc278a15619fb38c6c57480b8d99dd45
-
SSDEEP
6144:DTwoLZ6ooNhJ7fChHL9MhrzbwfGY1X43Pll+d6cZ2aNo/ddvgSzfIM:rLZPoN37KhHRMhPbeGOXiPlqu4olHZ
Malware Config
Extracted
remcos
SpamORGANIC
marketisportsstumi.win:80
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Banxcas-EUM1GF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/42b468b52493a6d5e82d05e3dc3f779ecbbc3c2756ec1d571e61dd7aa77115cd.exe
Files
-
9a87577ef09850111f4bf49ad89d4c6c.bin.zip
Password: infected
-
42b468b52493a6d5e82d05e3dc3f779ecbbc3c2756ec1d571e61dd7aa77115cd.exe.exe windows x86
Password: infected
04d77d421b8e5297898a3fce39d74267
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
ExpandEnvironmentStringsA
GetLongPathNameW
CopyFileW
GetLocaleInfoA
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetTempPathW
OpenProcess
OpenMutexA
lstrcatW
GetCurrentProcessId
GetTempFileNameW
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetTickCount
GlobalUnlock
WriteProcessMemory
ResumeThread
GetThreadContext
ReadProcessMemory
CreateProcessW
SetThreadContext
LocalAlloc
GlobalFree
MulDiv
SizeofResource
QueryDosDeviceW
FindFirstVolumeW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
lstrlenW
GetStdHandle
SetFilePointer
FindResourceA
LockResource
LoadResource
LocalFree
FindVolumeClose
GetVolumePathNamesForVolumeNameW
lstrcpyW
SetConsoleOutputCP
FindFirstFileA
FindNextVolumeW
AllocConsole
lstrcmpW
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetACP
GetModuleHandleExW
MoveFileExW
RtlUnwind
RaiseException
LoadLibraryExW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
GetFileSize
TerminateThread
GetLastError
GetModuleHandleA
RemoveDirectoryW
CreateDirectoryW
MoveFileW
SetFilePointerEx
GetLogicalDriveStringsA
DeleteFileW
DeleteFileA
SetFileAttributesW
GetFileAttributesW
FindClose
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
GetModuleHandleW
ExitProcess
CreateMutexA
GetCurrentProcess
GetProcAddress
LoadLibraryA
CreateProcessA
PeekNamedPipe
CreatePipe
TerminateProcess
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
SetEvent
CreateEventW
WaitForSingleObject
Sleep
GetModuleFileNameW
CloseHandle
ExitThread
CreateFileW
WriteFile
FormatMessageA
TlsAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
DecodePointer
EncodePointer
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
SetEndOfFile
user32
GetWindowTextW
wsprintfW
GetClipboardData
UnhookWindowsHookEx
GetForegroundWindow
ToUnicodeEx
GetKeyboardLayout
SetWindowsHookExA
CloseClipboard
OpenClipboard
GetKeyboardState
CallNextHookEx
GetKeyboardLayoutNameA
GetKeyState
GetWindowTextLengthW
GetWindowThreadProcessId
GetMessageA
SetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CloseWindow
SendInput
EnumDisplaySettingsW
mouse_event
CreatePopupMenu
DispatchMessageA
TranslateMessage
TrackPopupMenu
DefWindowProcA
CreateWindowExA
GetIconInfo
GetSystemMetrics
AppendMenuA
RegisterClassExA
GetCursorPos
SetForegroundWindow
DrawIcon
SystemParametersInfoW
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
StretchBlt
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyA
shell32
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
ShellExecuteW
ole32
CoInitializeEx
CoUninitialize
CoGetObject
shlwapi
PathFileExistsW
PathFileExistsA
StrToIntA
winmm
waveInUnprepareHeader
waveInOpen
waveInStart
waveInAddBuffer
PlaySoundW
mciSendStringA
mciSendStringW
waveInClose
waveInStop
waveInPrepareHeader
ws2_32
gethostbyname
send
WSAStartup
closesocket
inet_ntoa
htons
htonl
getservbyname
ntohs
getservbyport
gethostbyaddr
inet_addr
WSASetLastError
WSAGetLastError
recv
connect
socket
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusStartup
GdipLoadImageFromStream
wininet
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 347KB - Virtual size: 346KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ