Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 02:32

General

  • Target

    b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe

  • Size

    1.5MB

  • MD5

    16e2d29365a7362d9c0d83fe0664cceb

  • SHA1

    44e354aa9368155ebc2141b6e1ccb0b4b010c717

  • SHA256

    b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8

  • SHA512

    d6ed135c0c0eea9ae5c6ac2bd881e8431c77c0541782a06eb22c528e3756f7ece5f582f136ecbe20798652edb63f2474e8e8d67ef3836c5485a76a34a770456c

  • SSDEEP

    24576:UzZj1vnMyW6veAP/IjOyRokfEOHnQkgDG723byW2HCss3S0avVBbrYrfEXKfs:UlyyWuA6sj3QkgiW12i40y6MXK

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

one

C2

101.99.75.178:2404

101.99.75.178:8080

101.99.75.178:80

101.99.75.178:4899

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    xkosl-VDHNPT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe
        "C:\Users\Admin\AppData\Local\Temp\b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Recording Recording.cmd & Recording.cmd & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2400
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4776
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4988
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1728
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 594083
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2772
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "bookingsconstraintmoraltranscripts" Seriously
            4⤵
            • System Location Discovery: System Language Discovery
            PID:232
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Lease + ..\Mounted + ..\Equations + ..\Hole + ..\Marriage + ..\Cest + ..\Ext + ..\Savage + ..\Release + ..\Gig + ..\Considerations + ..\Dentists s
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2408
          • C:\Users\Admin\AppData\Local\Temp\594083\Explicit.pif
            Explicit.pif s
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4004
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3176
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HannahSense.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Innovations\HannahSense.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HannahSense.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:1268
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:8
      1⤵
        PID:2120

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\remcos\logs.dat

        Filesize

        144B

        MD5

        b8205bc37732d36322894a912145354c

        SHA1

        3df335c1af6b026b6b3a03954cf90f80e645e770

        SHA256

        4faab49a6419ba2e63a3377a8a8bd4cee64791125b25afdd4b25e80ad385f494

        SHA512

        56ef8eb1645b14766cb20e8700ffd1d637fa1c6a36909bdde9b74c16354e7073668dd71fe0bab3ed54b3327c25998a2bc7ed902d1ffe2fdd4bbc4a0ee1498135

      • C:\Users\Admin\AppData\Local\Temp\594083\Explicit.pif

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\594083\s

        Filesize

        899KB

        MD5

        3a2138cc87f0d5e59ee2f79da40544c3

        SHA1

        85692dd180db8605af69e9ddfb8507bff0313871

        SHA256

        a28baa4405b10257d3cb8df20a02e2956f081dc46119d49d43a9feda6430642a

        SHA512

        9059ea4b40ce82008cc6d885c1e14c2ef0aff5eab4831b50ef264f3040542a4f3e0f62c6f497e1daee9fef8cf4fe69bcac974306941ae2c68554bb9017e92666

      • C:\Users\Admin\AppData\Local\Temp\Cest

        Filesize

        59KB

        MD5

        236e410ac605018c16b224aeb6a03f0a

        SHA1

        b72509ef55b2a86445319e581928f08f0e57f86d

        SHA256

        720087dd3ae5a8ba851c7aff8d31720e2084b2f9c61d378853813fe33672b368

        SHA512

        4aea58a387b2e83e252e2ea793793165a9a07cfb57e892f6ad4606a0a580aca023132527d5a1851b44991f6956a5f0a55561a2f7f280a9a5197c01670f5af719

      • C:\Users\Admin\AppData\Local\Temp\Considerations

        Filesize

        86KB

        MD5

        2220cbf106bdade578b190844ac3d1c8

        SHA1

        c20ea361c50acd8f17bd8d6b4cc8df16a9bc6cf2

        SHA256

        900fa0d849d548b66ce5fb5d232f52dbefe0a366da2406c672f19cf32a0f0bcb

        SHA512

        d5876bf6390f7a6df97d6f5abc966c67ede32056fdaad24518b2de5c89104e4cffd2cc6e540766e85640ece8b06ae21d69a3f6b84885d25da59b6075c46acc92

      • C:\Users\Admin\AppData\Local\Temp\Dentists

        Filesize

        33KB

        MD5

        4a50d9253b3e59301e84dc1803a96ec9

        SHA1

        8302869d9a5d05b4f97a1bf01b536653ac7dc430

        SHA256

        144e7e328cf7323c73faec90342ad8876c25e43e94bd1b40f158198472f5e989

        SHA512

        24662dedcfbd01936b8fb845a2caf07388422a995ab85cebea8db47dff9b81185ab42f3eeb07de8060ab93406f719d90243a5b32446c422d6279d700f334ed09

      • C:\Users\Admin\AppData\Local\Temp\Equations

        Filesize

        62KB

        MD5

        d12e9999dd91423ef8a13bb10044a1b8

        SHA1

        5d3341eeb175f6a37cb535665fe70e4686a6ca63

        SHA256

        0c7535e5e2a31bf2a9d7179c9577f0443f34effd9197346beb0c6dcf49389bc9

        SHA512

        6eb3ddc9de6314bc19bfbd225d33839a3cc405d4953b7454e2d9e7ccf7f5d88e82d2153d659968dd732fa63d98e984253b15290a6beb0052179953ee8687acd1

      • C:\Users\Admin\AppData\Local\Temp\Ext

        Filesize

        86KB

        MD5

        be90eb4ddafd8ad8b439dfc08238b271

        SHA1

        450500c6e55663b0e1733a1fdb95846807e5b275

        SHA256

        ab2d3b8df2bedfe8c580d872f30d875c09e3a29061b3846dff43e36afb6663b1

        SHA512

        1de3cb4ba5ac2cbe4b0f829fec516d54507eb1c5e3da8b0cf37a2e54e810b4ccdf219efb160398abf26d4db11c618971bbe873eed6a54a0824c44fc79558d170

      • C:\Users\Admin\AppData\Local\Temp\Gig

        Filesize

        89KB

        MD5

        1f4a32317cd21c223bc78b621d44a309

        SHA1

        4d7adeeb4684b4da484f1130c115a1e5f48376b1

        SHA256

        1093bcd920325d2904f6d1d5c8051e4015ac1a57966a9c197a6ee74d02d73d8c

        SHA512

        92d021054c2d9005242ae7bf7034c27f5e69991e94c42ecd2d6a812aa8a01d9a29e4034ed4a977435fc8e347021552366a7b8e588848edf1ad8bd710a08d6f32

      • C:\Users\Admin\AppData\Local\Temp\Hole

        Filesize

        99KB

        MD5

        9d5185c412f3d31f158d8b2430c431fc

        SHA1

        6451492543fef5f8c3394b5cbdf5804aae95bdbf

        SHA256

        abc76dbed0e5b73b20565f4cb51598efe1597ad63081631ba3e45df2827974a0

        SHA512

        d2896a3a02efa5cf618c33c9a99b1a58763aedbc5dd93a1770cbcc1a7e663c647d17824a27b36a79a529556fbb922a795d70e4529ebeaaee769e9b0311ca3fc4

      • C:\Users\Admin\AppData\Local\Temp\Lease

        Filesize

        53KB

        MD5

        a379aa78abb0916dfd5c0e7880b64870

        SHA1

        db836c0a7915bcff8a3dd0f18a68a6a32cc761b8

        SHA256

        e96846a9e3cb74d243f1ddd55e6934ed3068807c0679ed050c409aec4592f20d

        SHA512

        e7b9d130e0d3a93cd2b80085ee79b071074bb761e569e4a2c2df52e1d39a041d4bfd8999f1960de3b69d7cc62df4d37648b81ce963119d8c957f4da991cb0108

      • C:\Users\Admin\AppData\Local\Temp\Marriage

        Filesize

        91KB

        MD5

        aa45ab0075c7411dd5605f0516f74f14

        SHA1

        5f7d6631863f15ccc53ece37e1f25bdf9174b52c

        SHA256

        bf67bf321527d057965238fa6eb454212475fcbec506ef8512d9b7f3d57de5dc

        SHA512

        54f93c55d4c625eb91792e563a764d0a341267ddec87f3ff847a5176bf4fb0300c585c1f7386bc90300fe0580c9c6575e0519b509434c4d05b9705349210005d

      • C:\Users\Admin\AppData\Local\Temp\Mounted

        Filesize

        72KB

        MD5

        adaad65fb027c1aeb61e3546b16f6027

        SHA1

        6311c5768c62fa791a8602cc72145e2abb9dda7f

        SHA256

        a398460ec1f44523c7cf99878abd78456324eb490bcc18feb8bd266c84232af5

        SHA512

        21ba07fbe4c34a146be248e3a216449b02f2bf737baf3883c487cf493375b35026821fdf153651e3acb00a3a950c02387970897bad3c46b006bbc19ed72e844e

      • C:\Users\Admin\AppData\Local\Temp\Recording

        Filesize

        18KB

        MD5

        5fa2688a9388ed53b64480ce3dc06fcb

        SHA1

        ed73f0917e6961a6ffc476624d90f60232692b0b

        SHA256

        231d848d0d72811ac52659fc12dd79efe72051c5974d07d9aea1130ff4391137

        SHA512

        deaf9a7910d19c45f487f6fff010492f9cec9dbd483de928bcf549e9526c1e59f37e4f48311603beb0577bda89a1cb29d20b3ac74e0584e8603b8f735423fe6a

      • C:\Users\Admin\AppData\Local\Temp\Release

        Filesize

        71KB

        MD5

        7b277987375b91e37caeedc8fd126423

        SHA1

        3fe054584e43f135abbec422fad320392d4c446e

        SHA256

        88f3f61d9080fe1b54ebb4f8da65987e20b0ad1744a80514c666df4c01a2eacb

        SHA512

        abefc43b068965f46b1539a99655cd7279d10a6bdfbd180165954582cf9771ca19713b8640ff5d9d4e3b1153bd63f6b36cfc440a538337b4e18c283272f2fdd9

      • C:\Users\Admin\AppData\Local\Temp\Savage

        Filesize

        98KB

        MD5

        0b83c1d40eecc8760ed8e08915b5a7de

        SHA1

        6859a9bad3a6afb03327ca88954ef2913e4b2f13

        SHA256

        f7425e689c3bee0dc7d527d29250765bc2f126e20ea4199d541542eb1c40678f

        SHA512

        63a61600066b4d2d7046168be1ab1d67165b8abd8e6f4285bd8ac6220fce8b50cd2eee6c21b9d5251f54f35f6e7e2a2a1c41191627dcb2f38b49ba05efa94689

      • C:\Users\Admin\AppData\Local\Temp\Seriously

        Filesize

        586B

        MD5

        b1414b4859bb82440354d835145cee56

        SHA1

        3182b0dbf7a0b928453f93f02ca3c6de6d2818a2

        SHA256

        87123241fcfc29bdc7ed114af4e95306c13ef7654637c8168d736db746d898b7

        SHA512

        cf14ff1527d9727a21481839d6c87d7c9b7012492d43601a05987e18e8f8d118d57689270fd711326a2bd4f9b17c56378d9798fdc5b4df3fe85e2429080b9263

      • C:\Users\Admin\AppData\Local\Temp\Thick

        Filesize

        872KB

        MD5

        c572fa8e4a4968da824b49eaf02f682b

        SHA1

        d54eb3b4b197c4f7a337af53b5c41472f1daa456

        SHA256

        04ab59b43246a06d16c9cc7700e817fa537fea69b83ec61d32a25d6172b5d095

        SHA512

        88dea4a69271dbd34eb14878f192d6a7759b82e1c64b1b369b4f6a51aacf39b32c71a1df152b1ad35d251c437540d5269acfabd589bceb43eb89a1d8e240a11b

      • memory/4004-44-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-45-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-46-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-47-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-48-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-49-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-50-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-52-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-55-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-54-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-61-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-43-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-67-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-73-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-78-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-79-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-85-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB

      • memory/4004-91-0x0000000004020000-0x00000000040A2000-memory.dmp

        Filesize

        520KB