Analysis
-
max time kernel
47s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:59
Behavioral task
behavioral1
Sample
remcos_a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
remcos_a.exe
Resource
win10v2004-20240802-en
General
-
Target
remcos_a.exe
-
Size
469KB
-
MD5
22ce3d0fc9f92829be87f978fc573680
-
SHA1
2a55144aed0886304b490fbcc623be46a8871065
-
SHA256
8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
-
SHA512
6bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSEn9:WiLJbpI7I2WhQqZ7E9
Malware Config
Extracted
remcos
COM Surrogate
stay-daughters.gl.at.ply.gg:43206
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
COM Surrogate.exe
-
copy_folder
COM Surrogate
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows
-
mouse_option
false
-
mutex
Rmc-C5SENV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
COM Surrogate
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
Processes:
COM Surrogate.exepid Process 2012 COM Surrogate.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid Process 2236 cmd.exe 2236 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
remcos_a.exeCOM Surrogate.exeiexplore.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" remcos_a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" remcos_a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 476 2728 WerFault.exe 34 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
COM Surrogate.exeiexplore.exedescription pid Process procid_target PID 2012 set thread context of 2728 2012 COM Surrogate.exe 34 PID 2728 set thread context of 2836 2728 iexplore.exe 35 -
Drops file in Windows directory 1 IoCs
Processes:
dxdiag.exedescription ioc Process File opened for modification C:\Windows\INF\setupapi.app.log dxdiag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeCOM Surrogate.exeiexplore.exedxdiag.exeremcos_a.exeWScript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 34 IoCs
Processes:
dxdiag.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dxdiag.exepid Process 2624 dxdiag.exe 2624 dxdiag.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
COM Surrogate.exeiexplore.exepid Process 2012 COM Surrogate.exe 2728 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
dxdiag.exedescription pid Process Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe Token: SeRestorePrivilege 2624 dxdiag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exedxdiag.exepid Process 2728 iexplore.exe 2624 dxdiag.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
remcos_a.exeWScript.execmd.exeCOM Surrogate.exeiexplore.exedescription pid Process procid_target PID 2076 wrote to memory of 2440 2076 remcos_a.exe 30 PID 2076 wrote to memory of 2440 2076 remcos_a.exe 30 PID 2076 wrote to memory of 2440 2076 remcos_a.exe 30 PID 2076 wrote to memory of 2440 2076 remcos_a.exe 30 PID 2440 wrote to memory of 2236 2440 WScript.exe 31 PID 2440 wrote to memory of 2236 2440 WScript.exe 31 PID 2440 wrote to memory of 2236 2440 WScript.exe 31 PID 2440 wrote to memory of 2236 2440 WScript.exe 31 PID 2236 wrote to memory of 2012 2236 cmd.exe 33 PID 2236 wrote to memory of 2012 2236 cmd.exe 33 PID 2236 wrote to memory of 2012 2236 cmd.exe 33 PID 2236 wrote to memory of 2012 2236 cmd.exe 33 PID 2012 wrote to memory of 2728 2012 COM Surrogate.exe 34 PID 2012 wrote to memory of 2728 2012 COM Surrogate.exe 34 PID 2012 wrote to memory of 2728 2012 COM Surrogate.exe 34 PID 2012 wrote to memory of 2728 2012 COM Surrogate.exe 34 PID 2012 wrote to memory of 2728 2012 COM Surrogate.exe 34 PID 2728 wrote to memory of 2836 2728 iexplore.exe 35 PID 2728 wrote to memory of 2836 2728 iexplore.exe 35 PID 2728 wrote to memory of 2836 2728 iexplore.exe 35 PID 2728 wrote to memory of 2836 2728 iexplore.exe 35 PID 2728 wrote to memory of 2836 2728 iexplore.exe 35 PID 2728 wrote to memory of 2624 2728 iexplore.exe 38 PID 2728 wrote to memory of 2624 2728 iexplore.exe 38 PID 2728 wrote to memory of 2624 2728 iexplore.exe 38 PID 2728 wrote to memory of 2624 2728 iexplore.exe 38 PID 2728 wrote to memory of 476 2728 iexplore.exe 40 PID 2728 wrote to memory of 476 2728 iexplore.exe 40 PID 2728 wrote to memory of 476 2728 iexplore.exe 40 PID 2728 wrote to memory of 476 2728 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\COM Surrogate\COM Surrogate.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\ProgramData\COM Surrogate\COM Surrogate.exe"C:\ProgramData\COM Surrogate\COM Surrogate.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2836
-
-
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt6⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 8686⤵
- Program crash
PID:476
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD522ce3d0fc9f92829be87f978fc573680
SHA12a55144aed0886304b490fbcc623be46a8871065
SHA2568741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
SHA5126bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c
-
Filesize
414B
MD501ea74daf9b956185c45016b68449bb0
SHA19d1a18d2c9a9f5ee04dc864adcd92f05577e9392
SHA2561b22904a4106604da03fd63fad1663a3562f928fbe6bfc90af4b8239142e83da
SHA51235566d72fc5739044bcb0ff14741c25aa0892fb6de57831eca737eb6896cd9c1c0837133504cf8df415a8e66196c317b86123967507d39814d3faaf989f8da02
-
Filesize
15KB
MD5815c6cabe8fa7a2fb0c3a21ef37551c6
SHA14574eef39edb92fc1c494073a4bec65ac772d88a
SHA256673486b12feed1e7952ae03c689a787be88018309d8cad0d89a6b83d0f28ed4d
SHA5123d3f368298fe5835b34da2321cd03bf4037322860ecff83fbe577e7813a34fdee16ec6b7b2528a1502581934883efec459a1514b96cacdd15691cc9b5ed0afd1