Analysis
-
max time kernel
19s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 13:40
Behavioral task
behavioral1
Sample
remcos_a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
remcos_a.exe
Resource
win10v2004-20240802-en
General
-
Target
remcos_a.exe
-
Size
469KB
-
MD5
722834785974c29b7422d7d06012ce78
-
SHA1
f1d099552614514b690a6eaa1db898601dd38ce0
-
SHA256
d819e34aab150310ecd4730140f3568bcc72531c9959e80353497e0f700fecb8
-
SHA512
2020af70096abef0623a792471eccf2e7cdb44393304d4f50e71dc16cf8e9a185328bc209a5bfc09b67c6dc7d76319b28b2fc249388c4341ab82be6c289e4af8
-
SSDEEP
12288:Imnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSjn9:4iLJbpI7I2WhQqZ7j9
Malware Config
Extracted
remcos
RemoteHost
firsyt205919-48538.portmap.host:48538
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%SystemDrive%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
Rmc-MV66H0
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%Temp%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
true
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
remcos.exepid process 2264 remcos.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2352 cmd.exe 2352 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
remcos_a.exeremcos.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos_a.exe -
Drops file in System32 directory 2 IoCs
Processes:
iexplore.exedescription ioc process File opened for modification C:\Windows\SysWOW64\remcos\logs.dat iexplore.exe File created C:\Windows\SysWOW64\remcos\logs.dat iexplore.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
remcos.exeiexplore.exedescription pid process target process PID 2264 set thread context of 2268 2264 remcos.exe iexplore.exe PID 2268 set thread context of 2692 2268 iexplore.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WScript.execmd.exeremcos.exeiexplore.exeremcos_a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
remcos.exepid process 2264 remcos.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
remcos.exeiexplore.exepid process 2264 remcos.exe 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2268 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
remcos_a.exeWScript.execmd.exeremcos.exeiexplore.exedescription pid process target process PID 276 wrote to memory of 2472 276 remcos_a.exe WScript.exe PID 276 wrote to memory of 2472 276 remcos_a.exe WScript.exe PID 276 wrote to memory of 2472 276 remcos_a.exe WScript.exe PID 276 wrote to memory of 2472 276 remcos_a.exe WScript.exe PID 2472 wrote to memory of 2352 2472 WScript.exe cmd.exe PID 2472 wrote to memory of 2352 2472 WScript.exe cmd.exe PID 2472 wrote to memory of 2352 2472 WScript.exe cmd.exe PID 2472 wrote to memory of 2352 2472 WScript.exe cmd.exe PID 2352 wrote to memory of 2264 2352 cmd.exe remcos.exe PID 2352 wrote to memory of 2264 2352 cmd.exe remcos.exe PID 2352 wrote to memory of 2264 2352 cmd.exe remcos.exe PID 2352 wrote to memory of 2264 2352 cmd.exe remcos.exe PID 2264 wrote to memory of 2268 2264 remcos.exe iexplore.exe PID 2264 wrote to memory of 2268 2264 remcos.exe iexplore.exe PID 2264 wrote to memory of 2268 2264 remcos.exe iexplore.exe PID 2264 wrote to memory of 2268 2264 remcos.exe iexplore.exe PID 2264 wrote to memory of 2268 2264 remcos.exe iexplore.exe PID 2268 wrote to memory of 2692 2268 iexplore.exe svchost.exe PID 2268 wrote to memory of 2692 2268 iexplore.exe svchost.exe PID 2268 wrote to memory of 2692 2268 iexplore.exe svchost.exe PID 2268 wrote to memory of 2692 2268 iexplore.exe svchost.exe PID 2268 wrote to memory of 2692 2268 iexplore.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Remcos\remcos.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Remcos\remcos.exeC:\Remcos\remcos.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2692
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD5722834785974c29b7422d7d06012ce78
SHA1f1d099552614514b690a6eaa1db898601dd38ce0
SHA256d819e34aab150310ecd4730140f3568bcc72531c9959e80353497e0f700fecb8
SHA5122020af70096abef0623a792471eccf2e7cdb44393304d4f50e71dc16cf8e9a185328bc209a5bfc09b67c6dc7d76319b28b2fc249388c4341ab82be6c289e4af8
-
Filesize
362B
MD5bf073fea4f0dc0dd4396a28625365359
SHA1ade8ba17f8966408e913ed6fef7f8a74edba4c5f
SHA256051b2712be665237334d3ce6faa46eb64e7742587736385ea0162c4fa64ba59a
SHA512f76deba47027204bfce82d62c21b87ec51e1c2f97a4c1575ab7b64fe7de47659d4f1f8a5f228a3446789353d7bf359ddb257d98340c75974139bc3afc002d446
-
Filesize
270B
MD516452639d1beee2ba0d8dabf907e07b4
SHA17e6f22a22fd8e0b87415c8902fb62631da9b0305
SHA256413ce18e9b3dd597042daf50382fedf02b9501db1cb6a8378dc3529207019e51
SHA512e701e458a30daf1e55edb9b59caea6b5f3ea0f0f075920a25a4a53f171a914401bbf90ed2c5d93d3cc6d6b74f09d54349797f3bd94638d891c4d76aa5d76535d