Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
Resource
win10v2004-20240226-en
General
-
Target
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe
-
Size
1.4MB
-
MD5
8ecf2c490c81dfc195a95d51033f2e55
-
SHA1
555dcc02731ea5df031260a9f94141a6e8301b17
-
SHA256
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e
-
SHA512
8431bd38f923d05db9acbaa4b79ed88a5f5c625bf3df2380c072fad5aa7fbdc714ab08eccb46cda50b1da4117684a05a795bcc51d9629499f637b1a927a3595b
-
SSDEEP
24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8aDSMUB220ZTSVspjHPYnczgFh8OhdQcK:ITvC/MTQYxsWR7aDSjB2hTSu5WLr8OvT
Malware Config
Extracted
remcos
RemoteHost
193.222.96.75:8823
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TNRDZX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 1 IoCs
Processes:
name.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
Processes:
name.exepid process 1240 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\directory\name.exe autoit_exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exename.exepid process 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe 1240 name.exe 1240 name.exe 1240 name.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exename.exepid process 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe 1240 name.exe 1240 name.exe 1240 name.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exedescription pid process target process PID 968 wrote to memory of 1240 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe name.exe PID 968 wrote to memory of 1240 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe name.exe PID 968 wrote to memory of 1240 968 669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe name.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe"C:\Users\Admin\AppData\Local\Temp\669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\669813c7b004be6e4fbb29350c526cefa094da76e72bd9914ddd0e84ef03111e.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD597004072dc603fb8911c18d0d81e1ecc
SHA1585427098a26e860c9e3fd96f48f6289ed69b49e
SHA256e0967f2731fdae9e6a101443d526e052b468ebf4e507da7b0a74bedf77d71e72
SHA512477cc3b8945a92c47d6343e658584ce9c91b149124d8ddb3bf2c0bb57e454ba73b2c0e93e8521227777f1ba1568091c1f9fa1476c91b7d662f16aae02ec1f4e2
-
C:\Users\Admin\AppData\Local\Temp\agelessFilesize
29KB
MD5ffa2e5ab3b36f5f9ae74cff2a038c1d4
SHA18ed7f9cf5089d8361dac06205f5d4567dd8006f9
SHA256afb5de202275b56fd3f692015b0ce44536db0db7659d392f9dc94d58da87c8f7
SHA5124775cfe9550daa79fae22c204b118bffc293059110250456b69b6539594d0d3dbe7dedec6cc53aea1890d88340489a993312f0d887453d3702f8a12c7cbb2492
-
C:\Users\Admin\AppData\Local\Temp\scrollFilesize
482KB
MD5d0d973e17f4f9faff0bd11e10be35a45
SHA18f6f95ff9d4d5ec970e1ce58902122bd682d8828
SHA256bc16cad3c5fcd0da9deb63a3ac44b660c6a979b1be970d526feff7cdae679f52
SHA5122e34d179a064b44043350b80a44601a5732d5ee79b201ab517af64bd806a535550288f2d13c2e961e4ca58ef63a0009a5073233619f3e912e3643434e0520367
-
C:\Users\Admin\AppData\Local\directory\name.exeFilesize
106.4MB
MD56bc085f01b9d2ad107bcd26eb213452f
SHA14bd66c0e667e2ae0246ea14ba2820cda4f2a47ea
SHA2560a02e24506da301d164396cd47cefcea284f886d211d769888e4ca62ee2df9ba
SHA51243e0b2e92e7e600bf6750919d662deb459851ce3b0aef0b706dc3682052f79e400c13efb782da78dfaeb07078cba968d1cf39befb437a111290cf541e59a7b3c
-
memory/968-10-0x0000000004050000-0x0000000004054000-memory.dmpFilesize
16KB
-
memory/1240-40-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-28-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-33-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-34-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-39-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-29-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-41-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-31-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-46-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-47-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-53-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-54-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-59-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-60-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-65-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1240-67-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB