Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 09:39

General

  • Target

    1a407d7c11c58235d559b6f378363840N.exe

  • Size

    1.9MB

  • MD5

    1a407d7c11c58235d559b6f378363840

  • SHA1

    0b3dc1ec4d896473aae4670310d03c62da9aebd2

  • SHA256

    fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd

  • SHA512

    65b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7

  • SSDEEP

    49152:Hh+ZkldoPK1XalKCc9nueh+ZkldoPK1XalKCc9nui:w2cPK1ab32cPK1abi

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

213.208.129.213:137

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    srvs.exe

  • copy_folder

    WindowsApp

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    WindowsApp

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_jpetmoenqu

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    srvs

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 47 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
      2⤵
        PID:2100
      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
        2⤵
          PID:2360
        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
          2⤵
            PID:2824
          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
            2⤵
              PID:1988
            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
              2⤵
                PID:1688
              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                2⤵
                  PID:1668
                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                  2⤵
                    PID:2956
                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                    2⤵
                      PID:1080
                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                      2⤵
                        PID:2652
                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                        2⤵
                          PID:1872
                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                          2⤵
                            PID:2300
                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                            2⤵
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:2284
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
                              3⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:2568
                              • C:\Windows\SysWOW64\PING.EXE
                                PING 127.0.0.1 -n 2
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:2776
                              • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                4⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:2892
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2616
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2556
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2576
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2624
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2636
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3052
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2620
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2876
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2896
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2648
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2932
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3040
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:316
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1880
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1432
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1408
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1956
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1928
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:264
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:572
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2268
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1636
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2504
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2520
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2408
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:604
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:440
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1168
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1900
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1536
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1772
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1700
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2976
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1084
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1748
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:904
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1680
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2404
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1388
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:600
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2080
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2372
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2248
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3064
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:2492
                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe
                                  "C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2388
                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                            2⤵
                              PID:2452
                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                              2⤵
                                PID:2860
                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                2⤵
                                  PID:2940
                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                  2⤵
                                    PID:1264
                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                    2⤵
                                      PID:2516
                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                      2⤵
                                        PID:2928
                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                        2⤵
                                          PID:2836
                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                          2⤵
                                            PID:2600
                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                            2⤵
                                              PID:2000
                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                              2⤵
                                                PID:1052
                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                2⤵
                                                  PID:696
                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                  2⤵
                                                    PID:1992
                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                    2⤵
                                                      PID:1648
                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                      2⤵
                                                        PID:2072
                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                        2⤵
                                                          PID:1784
                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                          2⤵
                                                            PID:2376
                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                            2⤵
                                                              PID:352
                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                              2⤵
                                                                PID:624
                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                2⤵
                                                                  PID:268
                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                  2⤵
                                                                    PID:308
                                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                    2⤵
                                                                      PID:1232
                                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                      2⤵
                                                                        PID:948
                                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                        2⤵
                                                                          PID:2216
                                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                          2⤵
                                                                            PID:2304
                                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                            2⤵
                                                                              PID:1328
                                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                              2⤵
                                                                                PID:2512
                                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                2⤵
                                                                                  PID:940
                                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                  2⤵
                                                                                    PID:664
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                    2⤵
                                                                                      PID:1972
                                                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                      2⤵
                                                                                        PID:1056
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                        2⤵
                                                                                          PID:2056
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                          2⤵
                                                                                            PID:984
                                                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                            2⤵
                                                                                              PID:344
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                              2⤵
                                                                                                PID:3020
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                2⤵
                                                                                                  PID:2252
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                  2⤵
                                                                                                    PID:3068
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                    2⤵
                                                                                                      PID:2500
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                      2⤵
                                                                                                        PID:880
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                        2⤵
                                                                                                          PID:2016
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                          2⤵
                                                                                                            PID:2320
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                            2⤵
                                                                                                              PID:2140
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                              2⤵
                                                                                                                PID:3008
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                2⤵
                                                                                                                  PID:2424
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                  2⤵
                                                                                                                    PID:2788
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                    2⤵
                                                                                                                      PID:892
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                      2⤵
                                                                                                                        PID:2596
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                        2⤵
                                                                                                                          PID:2720
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                          2⤵
                                                                                                                            PID:2676
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                            2⤵
                                                                                                                              PID:2136
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                              2⤵
                                                                                                                                PID:2724
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                2⤵
                                                                                                                                  PID:2592
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                  2⤵
                                                                                                                                    PID:2632
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                    2⤵
                                                                                                                                      PID:2604
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                      2⤵
                                                                                                                                        PID:2820
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                        2⤵
                                                                                                                                          PID:2888
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                          2⤵
                                                                                                                                            PID:2900
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                            2⤵
                                                                                                                                              PID:1236
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:1740
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                                2⤵
                                                                                                                                                  PID:1612
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1a407d7c11c58235d559b6f378363840N.exe"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:628

                                                                                                                                                Network

                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                Replay Monitor

                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                Downloads

                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\install.bat

                                                                                                                                                  Filesize

                                                                                                                                                  101B

                                                                                                                                                  MD5

                                                                                                                                                  16561b6804bab596f1cee44c3b88aea7

                                                                                                                                                  SHA1

                                                                                                                                                  e8b3d827a38f17ad04309b1760259558e3722061

                                                                                                                                                  SHA256

                                                                                                                                                  e6f65c9e9b69042c7ac81b8249ca98ba081f71e9025d4e3d700e6f3cea820077

                                                                                                                                                  SHA512

                                                                                                                                                  24eaf7ec5964ce2afa96357ec8d03b655359cf2e4136f2009fee638d32d3e9763d0089dae4a4a9a6826cee8ad587719706e6a75bf1b8f63d3665b9be675a68a4

                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RmClient.url

                                                                                                                                                  Filesize

                                                                                                                                                  64B

                                                                                                                                                  MD5

                                                                                                                                                  8c2657c9b64e308e633a005cd276b6cf

                                                                                                                                                  SHA1

                                                                                                                                                  4c79763fe05c29f5ad3cfba820386b814fac2581

                                                                                                                                                  SHA256

                                                                                                                                                  749d7d16186b3d8b4d53abdc87a9cf2d6334ec9b5ee5e73e24e9db64937bb0b8

                                                                                                                                                  SHA512

                                                                                                                                                  1c36d996a65316aa979b73d4e9d93edba87ac5f12abf1441d33c2288a3df63f22ad53db81553e613b3447229da5f25e794843c52120c01d59c0d528a63748305

                                                                                                                                                • C:\Users\Admin\AppData\Roaming\WindowsApp\srvs.exe

                                                                                                                                                  Filesize

                                                                                                                                                  1.9MB

                                                                                                                                                  MD5

                                                                                                                                                  1a407d7c11c58235d559b6f378363840

                                                                                                                                                  SHA1

                                                                                                                                                  0b3dc1ec4d896473aae4670310d03c62da9aebd2

                                                                                                                                                  SHA256

                                                                                                                                                  fb67541dcd9e7b88464ad7484f62fae23db0021a07bd0aa0c18aec110af4a5dd

                                                                                                                                                  SHA512

                                                                                                                                                  65b0183a03d88f53d0b9151503ca59e7f841b9504cf586efe84591e3e750374b5ad1ac7d590e620841e134e7717da24ec263df904f5ac3d48bca4039ff663fe7

                                                                                                                                                • C:\Users\Admin\MdRes\RmClient.vbs

                                                                                                                                                  Filesize

                                                                                                                                                  103B

                                                                                                                                                  MD5

                                                                                                                                                  7a10f112e597d6bc2317f41b888427bd

                                                                                                                                                  SHA1

                                                                                                                                                  5ced86ad8f9c50080a59f2425ddb39615622caf7

                                                                                                                                                  SHA256

                                                                                                                                                  2f48612a9514cda737b94c5786373ac3821a4ea94be793397db387eea3296b5e

                                                                                                                                                  SHA512

                                                                                                                                                  6dcb41ba5ebb101e7c891efae20ef8d5dd1d4828a567fa1d2fc26e13dbec00c7f817ec981cc077cfe247c4b5e8a75690809549e36bde48477450150d9eb6e2ed

                                                                                                                                                • C:\Users\Admin\MdRes\klist.exe

                                                                                                                                                  Filesize

                                                                                                                                                  1.9MB

                                                                                                                                                  MD5

                                                                                                                                                  1ff9b7f08e645b6fd7979789c777443d

                                                                                                                                                  SHA1

                                                                                                                                                  ea436e512bb564992a8fa067a6cfb38ff7252bd4

                                                                                                                                                  SHA256

                                                                                                                                                  57c0bfa0eda5afa7c94aa004d90597ec87560cba8ad1edb10517eb64e44fdf90

                                                                                                                                                  SHA512

                                                                                                                                                  dc78b4af8366a3df2e5c17c927c7b3b65537339ae60e1df49306cc0b26f2d33f836aeb954c8019f17cf6335cc479c5a834366b8139108204621c90b4a26a4ff7

                                                                                                                                                • memory/2284-13-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  92KB

                                                                                                                                                • memory/2284-10-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB

                                                                                                                                                • memory/2284-4-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  92KB

                                                                                                                                                • memory/2284-5-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  92KB

                                                                                                                                                • memory/2388-85-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  92KB

                                                                                                                                                • memory/2388-84-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  92KB

                                                                                                                                                • memory/2388-81-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB

                                                                                                                                                • memory/2960-3-0x00000000001A0000-0x00000000001A1000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB