Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 10:15

General

  • Target

    b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe

  • Size

    1.5MB

  • MD5

    16e2d29365a7362d9c0d83fe0664cceb

  • SHA1

    44e354aa9368155ebc2141b6e1ccb0b4b010c717

  • SHA256

    b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8

  • SHA512

    d6ed135c0c0eea9ae5c6ac2bd881e8431c77c0541782a06eb22c528e3756f7ece5f582f136ecbe20798652edb63f2474e8e8d67ef3836c5485a76a34a770456c

  • SSDEEP

    24576:UzZj1vnMyW6veAP/IjOyRokfEOHnQkgDG723byW2HCss3S0avVBbrYrfEXKfs:UlyyWuA6sj3QkgiW12i40y6MXK

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

one

C2

101.99.75.178:2404

101.99.75.178:8080

101.99.75.178:80

101.99.75.178:4899

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    xkosl-VDHNPT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe
        "C:\Users\Admin\AppData\Local\Temp\b4ca0b94b1a4e5b2ed28ad66c2df781b5add3c46cf5232b64b3a5253bcc341e8.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Recording Recording.cmd & Recording.cmd & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3604
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:680
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2344
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3476
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 594083
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4032
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "bookingsconstraintmoraltranscripts" Seriously
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1272
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Lease + ..\Mounted + ..\Equations + ..\Hole + ..\Marriage + ..\Cest + ..\Ext + ..\Savage + ..\Release + ..\Gig + ..\Considerations + ..\Dentists s
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3884
          • C:\Users\Admin\AppData\Local\Temp\594083\Explicit.pif
            Explicit.pif s
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4564
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:976
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HannahSense.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Innovations\HannahSense.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HannahSense.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      6f36ed419ff97e2b2ded05f2b23beb5f

      SHA1

      16e26ee6fd01bd4c29773b9cf379b47e31ddadd5

      SHA256

      97eeba1efbd2755fc53232046954f4c0c29caafda0a74f793d09d0f445390e11

      SHA512

      9c914bf54b81a08b6745631d4d2af12a68bf819a8b4d8b102325e650d139fd9f44762a76ad4c80f257d5578bc75c974e45f6dad2446170eba51fb6d7f76d5b96

    • C:\Users\Admin\AppData\Local\Temp\594083\Explicit.pif

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\594083\s

      Filesize

      899KB

      MD5

      3a2138cc87f0d5e59ee2f79da40544c3

      SHA1

      85692dd180db8605af69e9ddfb8507bff0313871

      SHA256

      a28baa4405b10257d3cb8df20a02e2956f081dc46119d49d43a9feda6430642a

      SHA512

      9059ea4b40ce82008cc6d885c1e14c2ef0aff5eab4831b50ef264f3040542a4f3e0f62c6f497e1daee9fef8cf4fe69bcac974306941ae2c68554bb9017e92666

    • C:\Users\Admin\AppData\Local\Temp\Cest

      Filesize

      59KB

      MD5

      236e410ac605018c16b224aeb6a03f0a

      SHA1

      b72509ef55b2a86445319e581928f08f0e57f86d

      SHA256

      720087dd3ae5a8ba851c7aff8d31720e2084b2f9c61d378853813fe33672b368

      SHA512

      4aea58a387b2e83e252e2ea793793165a9a07cfb57e892f6ad4606a0a580aca023132527d5a1851b44991f6956a5f0a55561a2f7f280a9a5197c01670f5af719

    • C:\Users\Admin\AppData\Local\Temp\Considerations

      Filesize

      86KB

      MD5

      2220cbf106bdade578b190844ac3d1c8

      SHA1

      c20ea361c50acd8f17bd8d6b4cc8df16a9bc6cf2

      SHA256

      900fa0d849d548b66ce5fb5d232f52dbefe0a366da2406c672f19cf32a0f0bcb

      SHA512

      d5876bf6390f7a6df97d6f5abc966c67ede32056fdaad24518b2de5c89104e4cffd2cc6e540766e85640ece8b06ae21d69a3f6b84885d25da59b6075c46acc92

    • C:\Users\Admin\AppData\Local\Temp\Dentists

      Filesize

      33KB

      MD5

      4a50d9253b3e59301e84dc1803a96ec9

      SHA1

      8302869d9a5d05b4f97a1bf01b536653ac7dc430

      SHA256

      144e7e328cf7323c73faec90342ad8876c25e43e94bd1b40f158198472f5e989

      SHA512

      24662dedcfbd01936b8fb845a2caf07388422a995ab85cebea8db47dff9b81185ab42f3eeb07de8060ab93406f719d90243a5b32446c422d6279d700f334ed09

    • C:\Users\Admin\AppData\Local\Temp\Equations

      Filesize

      62KB

      MD5

      d12e9999dd91423ef8a13bb10044a1b8

      SHA1

      5d3341eeb175f6a37cb535665fe70e4686a6ca63

      SHA256

      0c7535e5e2a31bf2a9d7179c9577f0443f34effd9197346beb0c6dcf49389bc9

      SHA512

      6eb3ddc9de6314bc19bfbd225d33839a3cc405d4953b7454e2d9e7ccf7f5d88e82d2153d659968dd732fa63d98e984253b15290a6beb0052179953ee8687acd1

    • C:\Users\Admin\AppData\Local\Temp\Ext

      Filesize

      86KB

      MD5

      be90eb4ddafd8ad8b439dfc08238b271

      SHA1

      450500c6e55663b0e1733a1fdb95846807e5b275

      SHA256

      ab2d3b8df2bedfe8c580d872f30d875c09e3a29061b3846dff43e36afb6663b1

      SHA512

      1de3cb4ba5ac2cbe4b0f829fec516d54507eb1c5e3da8b0cf37a2e54e810b4ccdf219efb160398abf26d4db11c618971bbe873eed6a54a0824c44fc79558d170

    • C:\Users\Admin\AppData\Local\Temp\Gig

      Filesize

      89KB

      MD5

      1f4a32317cd21c223bc78b621d44a309

      SHA1

      4d7adeeb4684b4da484f1130c115a1e5f48376b1

      SHA256

      1093bcd920325d2904f6d1d5c8051e4015ac1a57966a9c197a6ee74d02d73d8c

      SHA512

      92d021054c2d9005242ae7bf7034c27f5e69991e94c42ecd2d6a812aa8a01d9a29e4034ed4a977435fc8e347021552366a7b8e588848edf1ad8bd710a08d6f32

    • C:\Users\Admin\AppData\Local\Temp\Hole

      Filesize

      99KB

      MD5

      9d5185c412f3d31f158d8b2430c431fc

      SHA1

      6451492543fef5f8c3394b5cbdf5804aae95bdbf

      SHA256

      abc76dbed0e5b73b20565f4cb51598efe1597ad63081631ba3e45df2827974a0

      SHA512

      d2896a3a02efa5cf618c33c9a99b1a58763aedbc5dd93a1770cbcc1a7e663c647d17824a27b36a79a529556fbb922a795d70e4529ebeaaee769e9b0311ca3fc4

    • C:\Users\Admin\AppData\Local\Temp\Lease

      Filesize

      53KB

      MD5

      a379aa78abb0916dfd5c0e7880b64870

      SHA1

      db836c0a7915bcff8a3dd0f18a68a6a32cc761b8

      SHA256

      e96846a9e3cb74d243f1ddd55e6934ed3068807c0679ed050c409aec4592f20d

      SHA512

      e7b9d130e0d3a93cd2b80085ee79b071074bb761e569e4a2c2df52e1d39a041d4bfd8999f1960de3b69d7cc62df4d37648b81ce963119d8c957f4da991cb0108

    • C:\Users\Admin\AppData\Local\Temp\Marriage

      Filesize

      91KB

      MD5

      aa45ab0075c7411dd5605f0516f74f14

      SHA1

      5f7d6631863f15ccc53ece37e1f25bdf9174b52c

      SHA256

      bf67bf321527d057965238fa6eb454212475fcbec506ef8512d9b7f3d57de5dc

      SHA512

      54f93c55d4c625eb91792e563a764d0a341267ddec87f3ff847a5176bf4fb0300c585c1f7386bc90300fe0580c9c6575e0519b509434c4d05b9705349210005d

    • C:\Users\Admin\AppData\Local\Temp\Mounted

      Filesize

      72KB

      MD5

      adaad65fb027c1aeb61e3546b16f6027

      SHA1

      6311c5768c62fa791a8602cc72145e2abb9dda7f

      SHA256

      a398460ec1f44523c7cf99878abd78456324eb490bcc18feb8bd266c84232af5

      SHA512

      21ba07fbe4c34a146be248e3a216449b02f2bf737baf3883c487cf493375b35026821fdf153651e3acb00a3a950c02387970897bad3c46b006bbc19ed72e844e

    • C:\Users\Admin\AppData\Local\Temp\Recording

      Filesize

      18KB

      MD5

      5fa2688a9388ed53b64480ce3dc06fcb

      SHA1

      ed73f0917e6961a6ffc476624d90f60232692b0b

      SHA256

      231d848d0d72811ac52659fc12dd79efe72051c5974d07d9aea1130ff4391137

      SHA512

      deaf9a7910d19c45f487f6fff010492f9cec9dbd483de928bcf549e9526c1e59f37e4f48311603beb0577bda89a1cb29d20b3ac74e0584e8603b8f735423fe6a

    • C:\Users\Admin\AppData\Local\Temp\Release

      Filesize

      71KB

      MD5

      7b277987375b91e37caeedc8fd126423

      SHA1

      3fe054584e43f135abbec422fad320392d4c446e

      SHA256

      88f3f61d9080fe1b54ebb4f8da65987e20b0ad1744a80514c666df4c01a2eacb

      SHA512

      abefc43b068965f46b1539a99655cd7279d10a6bdfbd180165954582cf9771ca19713b8640ff5d9d4e3b1153bd63f6b36cfc440a538337b4e18c283272f2fdd9

    • C:\Users\Admin\AppData\Local\Temp\Savage

      Filesize

      98KB

      MD5

      0b83c1d40eecc8760ed8e08915b5a7de

      SHA1

      6859a9bad3a6afb03327ca88954ef2913e4b2f13

      SHA256

      f7425e689c3bee0dc7d527d29250765bc2f126e20ea4199d541542eb1c40678f

      SHA512

      63a61600066b4d2d7046168be1ab1d67165b8abd8e6f4285bd8ac6220fce8b50cd2eee6c21b9d5251f54f35f6e7e2a2a1c41191627dcb2f38b49ba05efa94689

    • C:\Users\Admin\AppData\Local\Temp\Seriously

      Filesize

      586B

      MD5

      b1414b4859bb82440354d835145cee56

      SHA1

      3182b0dbf7a0b928453f93f02ca3c6de6d2818a2

      SHA256

      87123241fcfc29bdc7ed114af4e95306c13ef7654637c8168d736db746d898b7

      SHA512

      cf14ff1527d9727a21481839d6c87d7c9b7012492d43601a05987e18e8f8d118d57689270fd711326a2bd4f9b17c56378d9798fdc5b4df3fe85e2429080b9263

    • C:\Users\Admin\AppData\Local\Temp\Thick

      Filesize

      872KB

      MD5

      c572fa8e4a4968da824b49eaf02f682b

      SHA1

      d54eb3b4b197c4f7a337af53b5c41472f1daa456

      SHA256

      04ab59b43246a06d16c9cc7700e817fa537fea69b83ec61d32a25d6172b5d095

      SHA512

      88dea4a69271dbd34eb14878f192d6a7759b82e1c64b1b369b4f6a51aacf39b32c71a1df152b1ad35d251c437540d5269acfabd589bceb43eb89a1d8e240a11b

    • memory/4564-44-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-45-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-46-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-47-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-48-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-49-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-50-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-52-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-55-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-54-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-60-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-43-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-67-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-72-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-78-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-79-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-86-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB

    • memory/4564-91-0x0000000003DC0000-0x0000000003E42000-memory.dmp

      Filesize

      520KB