Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
30-11-2023 17:41
Behavioral task
behavioral1
Sample
Remcos v4.9.3 Pro.exe
Resource
win7-20231023-en
General
-
Target
Remcos v4.9.3 Pro.exe
-
Size
467KB
-
MD5
ccb5f97be3daefc9cdeaff2aec1ad323
-
SHA1
3b561e66a88eb6072a363c1b9cc52d0a679c20e6
-
SHA256
f7284ed876aebbf3407d50fd6acdbd11adb75c31550c3034c1600f4eb4e61043
-
SHA512
c6716462e91b02b561ebe89418c3a36eea7dea6924ff6483cef6c834512123258706924cb8ec07040325522d41fe329659758b01f69bf6a17805599344f01180
-
SSDEEP
6144:sXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZsAX4cNF5Gv:sX7tPMK8ctGe4Dzl4h2QnuPs/Zs0cv
Malware Config
Extracted
remcos
nulled
essagbs.ddns.net:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
svhost.exe
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
logs
-
mouse_option
false
-
mutex
ewaewefsefsefdseadwadf-21RLZF
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Remcos v4.9.3 Pro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" Remcos v4.9.3 Pro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" iexplore.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 svhost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" Remcos v4.9.3 Pro.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" Remcos v4.9.3 Pro.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\ewaewefsefsefdseadwadf-21RLZF = "\"C:\\Windows\\svhost.exe\"" svhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2652 set thread context of 2740 2652 svhost.exe 33 PID 2740 set thread context of 2728 2740 iexplore.exe 39 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svhost.exe Remcos v4.9.3 Pro.exe File opened for modification C:\Windows\svhost.exe Remcos v4.9.3 Pro.exe File opened for modification C:\Windows\INF\setupapi.app.log dxdiag.exe File opened for modification C:\Windows\svhost.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 2616 reg.exe 2512 reg.exe 2560 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 332 dxdiag.exe 332 dxdiag.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2652 svhost.exe 2740 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe Token: SeRestorePrivilege 332 dxdiag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 iexplore.exe 332 dxdiag.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2800 1060 Remcos v4.9.3 Pro.exe 28 PID 1060 wrote to memory of 2800 1060 Remcos v4.9.3 Pro.exe 28 PID 1060 wrote to memory of 2800 1060 Remcos v4.9.3 Pro.exe 28 PID 1060 wrote to memory of 2800 1060 Remcos v4.9.3 Pro.exe 28 PID 1060 wrote to memory of 2652 1060 Remcos v4.9.3 Pro.exe 31 PID 1060 wrote to memory of 2652 1060 Remcos v4.9.3 Pro.exe 31 PID 1060 wrote to memory of 2652 1060 Remcos v4.9.3 Pro.exe 31 PID 1060 wrote to memory of 2652 1060 Remcos v4.9.3 Pro.exe 31 PID 2800 wrote to memory of 2616 2800 cmd.exe 30 PID 2800 wrote to memory of 2616 2800 cmd.exe 30 PID 2800 wrote to memory of 2616 2800 cmd.exe 30 PID 2800 wrote to memory of 2616 2800 cmd.exe 30 PID 2652 wrote to memory of 2720 2652 svhost.exe 32 PID 2652 wrote to memory of 2720 2652 svhost.exe 32 PID 2652 wrote to memory of 2720 2652 svhost.exe 32 PID 2652 wrote to memory of 2720 2652 svhost.exe 32 PID 2652 wrote to memory of 2740 2652 svhost.exe 33 PID 2652 wrote to memory of 2740 2652 svhost.exe 33 PID 2652 wrote to memory of 2740 2652 svhost.exe 33 PID 2652 wrote to memory of 2740 2652 svhost.exe 33 PID 2720 wrote to memory of 2512 2720 cmd.exe 34 PID 2720 wrote to memory of 2512 2720 cmd.exe 34 PID 2720 wrote to memory of 2512 2720 cmd.exe 34 PID 2720 wrote to memory of 2512 2720 cmd.exe 34 PID 2652 wrote to memory of 2740 2652 svhost.exe 33 PID 2740 wrote to memory of 2668 2740 iexplore.exe 35 PID 2740 wrote to memory of 2668 2740 iexplore.exe 35 PID 2740 wrote to memory of 2668 2740 iexplore.exe 35 PID 2740 wrote to memory of 2668 2740 iexplore.exe 35 PID 2668 wrote to memory of 2560 2668 cmd.exe 38 PID 2668 wrote to memory of 2560 2668 cmd.exe 38 PID 2668 wrote to memory of 2560 2668 cmd.exe 38 PID 2668 wrote to memory of 2560 2668 cmd.exe 38 PID 2740 wrote to memory of 2728 2740 iexplore.exe 39 PID 2740 wrote to memory of 2728 2740 iexplore.exe 39 PID 2740 wrote to memory of 2728 2740 iexplore.exe 39 PID 2740 wrote to memory of 2728 2740 iexplore.exe 39 PID 2740 wrote to memory of 2728 2740 iexplore.exe 39 PID 2740 wrote to memory of 332 2740 iexplore.exe 43 PID 2740 wrote to memory of 332 2740 iexplore.exe 43 PID 2740 wrote to memory of 332 2740 iexplore.exe 43 PID 2740 wrote to memory of 332 2740 iexplore.exe 43 PID 2740 wrote to memory of 1536 2740 iexplore.exe 45 PID 2740 wrote to memory of 1536 2740 iexplore.exe 45 PID 2740 wrote to memory of 1536 2740 iexplore.exe 45 PID 2740 wrote to memory of 1536 2740 iexplore.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remcos v4.9.3 Pro.exe"C:\Users\Admin\AppData\Local\Temp\Remcos v4.9.3 Pro.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2616
-
-
-
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:2512
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:2560
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2728
-
-
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt4⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:332
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wfphnbumtkurc.vbs"4⤵PID:1536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD5c894c86f1264d487437ca652291a6c7e
SHA17c1a00da8d1afb5afdef6fe6c04701738958db95
SHA256ecd3217430b344d77f078c08a8207bd9ab2738bf3844a80050641f6c26d51059
SHA5123a86736dee83c8279786beecfa29e09dee1c2f7c6d2319d1349fa5cb6b024a3bcba73b2d9b32fd2dec42b875fd7f9ddd54c022e35e290dd5b8189dcb34d27361
-
Filesize
15KB
MD5a29b9352798d0f783cce266c7847017c
SHA1c3bf0df87754c6275773326711059a1058c92851
SHA25682a06462de98e42d3b111f780d9a3d2067edfead18152f1f54b08dda39c68fef
SHA5125616749d739a7b31cfdebbf2b000f24db1946a0245d4a2df560c93ce4dcd9108fbbc570b76b617f9c3c48335854a469a4bd5033fa28534bc9091cb9f4ecf1ca9
-
Filesize
404B
MD5add5c07ccccb47a55d146baefa26ae14
SHA1f4f673a17ff2d1ccf91ba8fab00c07869c07f1e7
SHA2563c57ff2c305b8048ce2569a62fe40c600c891a81cece9ee42f2f8310c0a83518
SHA5129786c6f0d60de49a417a194e77859427517a6819f450676a303226f793f108ae4f8345cfd2cb94ecd5a204d6592a81325c7d80a7a08b318a922621495ffa9261
-
Filesize
467KB
MD5ccb5f97be3daefc9cdeaff2aec1ad323
SHA13b561e66a88eb6072a363c1b9cc52d0a679c20e6
SHA256f7284ed876aebbf3407d50fd6acdbd11adb75c31550c3034c1600f4eb4e61043
SHA512c6716462e91b02b561ebe89418c3a36eea7dea6924ff6483cef6c834512123258706924cb8ec07040325522d41fe329659758b01f69bf6a17805599344f01180
-
Filesize
467KB
MD5ccb5f97be3daefc9cdeaff2aec1ad323
SHA13b561e66a88eb6072a363c1b9cc52d0a679c20e6
SHA256f7284ed876aebbf3407d50fd6acdbd11adb75c31550c3034c1600f4eb4e61043
SHA512c6716462e91b02b561ebe89418c3a36eea7dea6924ff6483cef6c834512123258706924cb8ec07040325522d41fe329659758b01f69bf6a17805599344f01180
-
Filesize
467KB
MD5ccb5f97be3daefc9cdeaff2aec1ad323
SHA13b561e66a88eb6072a363c1b9cc52d0a679c20e6
SHA256f7284ed876aebbf3407d50fd6acdbd11adb75c31550c3034c1600f4eb4e61043
SHA512c6716462e91b02b561ebe89418c3a36eea7dea6924ff6483cef6c834512123258706924cb8ec07040325522d41fe329659758b01f69bf6a17805599344f01180