Analysis Overview
SHA256
4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002
Threat Level: Known bad
The file 4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe was found to be: Known bad.
Malicious Activity Summary
Remcos
Suspicious use of SetThreadContext
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-17 01:15
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-17 01:15
Reported
2024-08-17 01:18
Platform
win7-20240729-en
Max time kernel
94s
Max time network
16s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
Network
Files
memory/568-0-0x00000000744BE000-0x00000000744BF000-memory.dmp
memory/568-1-0x00000000003F0000-0x00000000004F2000-memory.dmp
memory/568-2-0x00000000744B0000-0x0000000074B9E000-memory.dmp
memory/568-3-0x0000000005B80000-0x0000000005C72000-memory.dmp
memory/568-4-0x0000000000740000-0x000000000075E000-memory.dmp
memory/568-5-0x00000000744BE000-0x00000000744BF000-memory.dmp
memory/568-6-0x00000000744B0000-0x0000000074B9E000-memory.dmp
memory/568-7-0x0000000000760000-0x0000000000776000-memory.dmp
memory/568-8-0x0000000005C70000-0x0000000005D30000-memory.dmp
memory/568-9-0x00000000744B0000-0x0000000074B9E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-17 01:15
Reported
2024-08-17 01:18
Platform
win10v2004-20240802-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Remcos
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3140 set thread context of 2340 | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe
"C:\Users\Admin\AppData\Local\Temp\4eaacedcb5c204340fb5b45bbf5b625f8951efdb4a4035b9b621d07880bd0002.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | magaji.duckdns.org | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| MY | 103.186.117.57:2404 | magaji.duckdns.org | tcp |
| US | 8.8.8.8:53 | geoplugin.net | udp |
| NL | 178.237.33.50:80 | geoplugin.net | tcp |
| US | 8.8.8.8:53 | 57.117.186.103.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.33.237.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
Files
memory/3140-0-0x00000000746CE000-0x00000000746CF000-memory.dmp
memory/3140-1-0x00000000004F0000-0x00000000005F2000-memory.dmp
memory/3140-3-0x0000000005010000-0x00000000050A2000-memory.dmp
memory/3140-2-0x00000000054E0000-0x0000000005A84000-memory.dmp
memory/3140-6-0x0000000005260000-0x00000000052FC000-memory.dmp
memory/3140-5-0x00000000746C0000-0x0000000074E70000-memory.dmp
memory/3140-4-0x0000000005000000-0x000000000500A000-memory.dmp
memory/3140-7-0x0000000006300000-0x00000000063F2000-memory.dmp
memory/3140-8-0x00000000054A0000-0x00000000054BE000-memory.dmp
memory/3140-9-0x00000000746CE000-0x00000000746CF000-memory.dmp
memory/3140-10-0x00000000746C0000-0x0000000074E70000-memory.dmp
memory/3140-11-0x00000000054C0000-0x00000000054D6000-memory.dmp
memory/3140-12-0x000000000A2A0000-0x000000000A360000-memory.dmp
memory/2340-16-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-18-0x0000000000400000-0x0000000000482000-memory.dmp
memory/3140-22-0x00000000746C0000-0x0000000074E70000-memory.dmp
memory/2340-21-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-17-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-14-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-13-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-23-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-24-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-25-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-26-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-28-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-30-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-31-0x0000000000400000-0x0000000000482000-memory.dmp
C:\ProgramData\remcos\logs.dat
| MD5 | 5a2f06916f04affbd7664163a891740e |
| SHA1 | 76ae2e7e56ca8b9d3a1efe16f4fed418881b91f7 |
| SHA256 | 72016d193d1c5532480deaa6fdbe2fff477aa01eed57a95dcd192a89115c506d |
| SHA512 | 7c35e9fc744ce9c96623e32478f748ec77de2a41d67e47cba296f13e70f51fb5aed3ab971b9fd9f96a632b0fcedb80dfa3dc5dda508a938e3744d5897bc3a16f |
memory/2340-38-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-46-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-47-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-54-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-55-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-62-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2340-63-0x0000000000400000-0x0000000000482000-memory.dmp