Behavioral task
behavioral1
Sample
remcos_a.exe
Resource
win10v2004-20231222-en
General
-
Target
remcos_a.exe
-
Size
422KB
-
MD5
224d174a6fc896aae221cc6ce64f2da8
-
SHA1
42b175b3e374c7bb40d330f8cee25b7772b0d253
-
SHA256
8e7cd4fceba49a4aaeb4e3531a9176cb4d6994fe2079bbc3f1a1e202ba1c0360
-
SHA512
da7449994e14614489b68932ac3393593bcc730d84a5da16004d75089b53a75303c6ff0049cbb9a69b524d863e53cec6fab2774a788f7e442e4774c4fe7bfc35
-
SSDEEP
12288:bHwQahcuNhq3aNHLj1kP2mahWUrDCKAK:X6cucaNrjEadnPj
Malware Config
Extracted
remcos
3.5.0 Light
RemoteHost
23543254365-58443.portmap.host:58443
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-CEI3FV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource remcos_a.exe
Files
-
remcos_a.exe.exe windows:5 windows x86 arch:x86
053ec708dbae5251815ac742548af739
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetCurrentProcess
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetCurrentProcessId
GetTickCount
GlobalUnlock
LocalAlloc
GlobalFree
MulDiv
SizeofResource
GetLongPathNameW
RemoveDirectoryW
FindResourceA
OpenProcess
LockResource
LoadResource
LocalFree
GetFileSize
FormatMessageA
GetModuleFileNameA
lstrcpynA
AllocConsole
QueryPerformanceFrequency
Process32FirstW
DeleteFileA
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapReAlloc
GetACP
GetStdHandle
GetModuleHandleExW
MoveFileExW
RtlUnwind
LoadLibraryA
Process32NextW
CreateToolhelp32Snapshot
GetLocaleInfoA
GetModuleHandleA
CreateMutexA
ExitProcess
SetFileAttributesW
QueryPerformanceCounter
GetModuleFileNameW
GetLastError
ExpandEnvironmentStringsA
FindNextFileA
FindFirstFileA
MoveFileW
SetFilePointerEx
GetLogicalDriveStringsA
DeleteFileW
WaitForSingleObject
GetFileAttributesW
CreateFileW
FindClose
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
CreateDirectoryW
CreateProcessA
Sleep
PeekNamedPipe
CreatePipe
TerminateProcess
WriteFile
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
CloseHandle
SetEvent
CreateEventW
EnterCriticalSection
RaiseException
LoadLibraryExW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
DecodePointer
EncodePointer
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
WaitForSingleObjectEx
ResetEvent
SetEndOfFile
user32
GetMessageA
GetWindowTextW
SetForegroundWindow
SetClipboardData
GetClipboardData
EnumWindows
ExitWindowsEx
IsWindowVisible
CloseWindow
GetWindowThreadProcessId
SendInput
mouse_event
DrawIcon
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetForegroundWindow
GetCursorPos
RegisterClassExA
AppendMenuA
CreateWindowExA
DefWindowProcA
TrackPopupMenu
CreatePopupMenu
DispatchMessageA
SetWindowTextW
TranslateMessage
ShowWindow
MessageBoxW
OpenClipboard
EmptyClipboard
CloseClipboard
gdi32
SelectObject
CreateCompatibleDC
StretchBlt
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
CreateCompatibleBitmap
advapi32
RegSetValueExW
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyA
shell32
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
ShellExecuteW
shlwapi
StrToIntA
PathFileExistsA
PathFileExistsW
winmm
PlaySoundW
mciSendStringW
mciSendStringA
ws2_32
send
WSAStartup
closesocket
htons
socket
getservbyname
inet_ntoa
ntohs
getservbyport
gethostbyaddr
inet_addr
WSASetLastError
connect
recv
WSAGetLastError
gethostbyname
htonl
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdiplusStartup
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipLoadImageFromStream
wininet
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ