Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 17:57

General

  • Target

    SecuriteInfo.com.Trojan.PackedNET.3042.3323.24927.exe

  • Size

    968KB

  • MD5

    fce908c3d656198dce6bafb77f0b9638

  • SHA1

    0952a34cffd6ab444ed21889e0fa5eac6019ac5a

  • SHA256

    8b4d43e5b2ff9fe2d915daa5c884832dd0635b231274236bfa4863d0220d4eba

  • SHA512

    7796c6ba87d4d03d0a88e9ec1e71fe63c43fefaf2849f432413e5ab7763d087785661ba603026df0ea90db4bae770827a78f3694fb5071408016fa39acd94c7a

  • SSDEEP

    12288:2d0NXLNiM0oqUO2rMQvQtcRyzCKBCDZvtcVRUyDWrwye9UIZq6UrN5GMAYr2ao0q:nbNiMN17rMtcoa22yDWrwye9XZq641o

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

magaji.duckdns.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ORKMG9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.3042.3323.24927.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.3042.3323.24927.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.3042.3323.24927.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.3042.3323.24927.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    50fa1099e483c43958a6b1065a21703f

    SHA1

    dc8eaa983cbd340e105a97654d6147dd075afe5e

    SHA256

    057733762a53d53d6628975203dc12fa8aabeee06bde7e6bc7091829ee3e0de7

    SHA512

    4d5cc9936d8e06ea02161159f12ace029c5068597230d10e205ea2f38a0694e2cd2826684ea5357a0030fe2e070a6b1d3c267745a69a2c848e769be9d81c0a0e

  • memory/2756-46-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-60-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-77-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-7-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-69-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-68-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-19-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-23-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-25-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-17-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-15-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-13-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-31-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-26-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-11-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-9-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-8-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-76-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-61-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-29-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-32-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-33-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-34-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-39-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-40-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-42-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-43-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-44-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-53-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2756-52-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3028-1-0x0000000000F60000-0x0000000001058000-memory.dmp

    Filesize

    992KB

  • memory/3028-0-0x00000000741AE000-0x00000000741AF000-memory.dmp

    Filesize

    4KB

  • memory/3028-30-0x00000000741A0000-0x000000007488E000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-2-0x00000000741A0000-0x000000007488E000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-6-0x0000000005170000-0x0000000005230000-memory.dmp

    Filesize

    768KB

  • memory/3028-5-0x00000000741A0000-0x000000007488E000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-4-0x00000000741AE000-0x00000000741AF000-memory.dmp

    Filesize

    4KB

  • memory/3028-3-0x0000000000390000-0x00000000003A8000-memory.dmp

    Filesize

    96KB