Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 12:51

General

  • Target

    526875bdc336195294e15f6af9a40395.exe

  • Size

    1.8MB

  • MD5

    526875bdc336195294e15f6af9a40395

  • SHA1

    3e78acc0279af13375a297eb18115165639d71d5

  • SHA256

    e5e142eea2e5369d6ddef616cd7acf6816ae9e194a77c00214be8575b983dc2f

  • SHA512

    01f2c49b1768b1d81f8daebcac5edf4c2f30f5553173e1e25ec4ab7c6524671649c93f558aa36e87b651739d94c2e6eb3e694eee0634636cb845efc28e359934

  • SSDEEP

    24576:b9JqK9kUjjPvzutYvSHU2GJCkZneeiAhP7alGoZEx/9UMgegHIuFL88+dDlPd:bvqKuA3zu6ptvPGEoZExtgouF3KL

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

195.246.231.197:606

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-A17NCX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\526875bdc336195294e15f6af9a40395.exe
        "C:\Users\Admin\AppData\Local\Temp\526875bdc336195294e15f6af9a40395.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Potato Potato.bat & Potato.bat & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1852
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4376
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4244
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4892
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 334513
            4⤵
            • System Location Discovery: System Language Discovery
            PID:868
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "EXPENDITUREFORECASTSTOBACCOABU" Kids
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2556
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Start + ..\Jungle + ..\Victoria + ..\Rehabilitation + ..\Durable + ..\Revolutionary + ..\Mel + ..\Era + ..\Promises + ..\Loose + ..\Villages + ..\Malta + ..\Venture + ..\Josh K
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2760
          • C:\Users\Admin\AppData\Local\Temp\334513\Classes.pif
            Classes.pif K
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3376
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3136
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & echo URL="C:\Users\Admin\AppData\Local\WellnessPulse Solutions\HealthPulse.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:1504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\334513\Classes.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\334513\K

      Filesize

      925KB

      MD5

      4f15603763cee300f38f4c32fdc99149

      SHA1

      a87df56aaceca21965295fb425e57d74bca9b48a

      SHA256

      b7650a0fc0e5ee50e9304ab7b0a826a3542166e2459614675fdb6b816d69d8e2

      SHA512

      d43f13f86aa5083287def7e8a75a17baa683415ae5e5c262311c991fb1d4a57e010af061cc525edb209de270a85edc7267250f359991ce08818202ae60463e21

    • C:\Users\Admin\AppData\Local\Temp\Albuquerque

      Filesize

      870KB

      MD5

      dd3fbb8d741e82df5a99be61fdd223c3

      SHA1

      2b38d8b5d4f577cc4f4360e215336e600044f521

      SHA256

      e042c9cd9ddf3104d67a0ca6da16ebaf325861c77b81bfcd02067b5d21c3f128

      SHA512

      c57d0c89023b0a2f2778ac90e56ca3243fde9791bf7edbdb10db51410b421d8f86bdf9fd7cbcaff037e1ef9600c2d7312280207bc488b955b732b7c3704ffaed

    • C:\Users\Admin\AppData\Local\Temp\Durable

      Filesize

      66KB

      MD5

      63603857cb72305c4c0cc8a340e09116

      SHA1

      7ffe4d2001ec9f34e11e8dd0c7e52e3104422c68

      SHA256

      55ef2bd300d564e6fa3cf4273837f261996b051a319eed4517d7417c2a1ecd25

      SHA512

      b35b5ab0ae588d70c09be259f32f4a2716b33151bd954d02ae87d508e9896379cde99cd4bed2cf3d9a3bc7ea0f0ee3f5f2bed731fa97840719b71dea3de16850

    • C:\Users\Admin\AppData\Local\Temp\Era

      Filesize

      72KB

      MD5

      8a63923ab9abc4e1ac0574a66aa13270

      SHA1

      f420c46af0634af86bd047f5e2d8fb9b5ac8fa63

      SHA256

      73b163606012836b5e4f2d0509cb85f85b79c370a7868203030526be3cda1306

      SHA512

      c5a9f74ffb08b98b9159071eebf2cf8d10b80cefda6e55ae27a67d7eea4f05ec3b6dd7d8ad2372ca4f8efe3d0b3d3c0b12fcac66af8bc39a6e66de72d5d8a026

    • C:\Users\Admin\AppData\Local\Temp\Josh

      Filesize

      19KB

      MD5

      4076fc7d68c8c15b23feb7a3bdfcceb7

      SHA1

      097afe3177ade13700428b43060e42e82ba26502

      SHA256

      6a3924f856ed92369ff9553bd3540df394564b3f58bc4e7add43fa4a324802b4

      SHA512

      710bf02cb1749bc06b38161bd8531568c610081c01c42e55621de23fcc826a1f0a31f9e17b67b4b189249a7276e57152aba265243f8ecc3af8e841171d8e213a

    • C:\Users\Admin\AppData\Local\Temp\Jungle

      Filesize

      90KB

      MD5

      1c2f407f0082bf02504e48e1549497ed

      SHA1

      b4ea6c71c1678cf598e25f74d8e5e8243a580a4a

      SHA256

      1d790d63252726341d9ec6f90f2ccc50c5f7608d773b234ba30f10199e0b9747

      SHA512

      c6a3f18209a9cbfbd4ea680f0a2c468814e7ff60d479cce470ef31b65834809f7bbe6be21d1086ba47ca69e1a6fe2048be5a7cd7764ebd1e5eb7b0d7a9acc374

    • C:\Users\Admin\AppData\Local\Temp\Kids

      Filesize

      2KB

      MD5

      6e2afe723abb8f7544a35ee06b906b24

      SHA1

      74d40251d35e6a09cef98b9e84043b1c8b344d80

      SHA256

      55944652d0e928a2a2028249238d58123220036b234726275e6176b9376caeac

      SHA512

      97aebefe2f51bb2e4ca68d1cb6120191ae1fe57619d2041842cfb76e3cab30067a21404c1011bc86617807b03a9f4d53b56f1fffb287ae442cad34a29eae13f9

    • C:\Users\Admin\AppData\Local\Temp\Loose

      Filesize

      81KB

      MD5

      c0dd4ffeb108c1448dbb63bb1150bad1

      SHA1

      bf49bead77cef6502af6e29689cb25b6c8267f08

      SHA256

      566d3ff3865baf22cab3c87eb452eae21f6efe8b49e566af2167fe5c7ebc469a

      SHA512

      e62752c7fecced157e06508772034ad4f486b0febf82efb0a3a9034f8c4254de452566d6a070c98197a40eae3b0bfe373e7b8e368d0f86ad053c95808a14230f

    • C:\Users\Admin\AppData\Local\Temp\Malta

      Filesize

      77KB

      MD5

      4fa61d0a5954ee0805188a7085198d03

      SHA1

      ca9231c6f909535ed4912c1210ab741ed081ca10

      SHA256

      f3cafcdf6ea38c801e28b37a7757ab244edfdd45d417c75a43ab2cb8a6b91455

      SHA512

      a1e81e60908429b7f95bf57a8e7a15a608193dee8a3c05351cf5234ba38bab9c51ef5b145a813f280eadad33bdacad762e39d736e88bb2e99b8204f46a2253ed

    • C:\Users\Admin\AppData\Local\Temp\Mel

      Filesize

      51KB

      MD5

      35afb92fc2fae6f82a58bf5733343cd9

      SHA1

      c562e75c2b2d6fd9e7d5af3ea36aaac0b1ac10a7

      SHA256

      81153573a7b7d1abd367e35759a423b92b6fc6decc677bf83a7e0da7b39f7b42

      SHA512

      13034891ea2cfd3210efc5f46bd5fd68347b65ca606474a7c4fefaa60bbf9782c0e9077801fb441f8cb52f23704e29b05090206d1a30b81ddc7cd78001d7993d

    • C:\Users\Admin\AppData\Local\Temp\Potato

      Filesize

      19KB

      MD5

      86c61fa9a8af49f958d808f6c076794e

      SHA1

      51b98575b9263105683aed73bdccf9de9484ddf6

      SHA256

      2e6ea0710ea76b407f12c5095491ab76609a23881e2fa676df87faef9676df02

      SHA512

      5f9a5b3db9acfac0eef8863ca82cc2ab1d9c76d023887136ac7cb911bf380601fa3225905c277015bcd4557fce8a856012c512b8732ec8192bd4d0059ef454cd

    • C:\Users\Admin\AppData\Local\Temp\Promises

      Filesize

      89KB

      MD5

      7e72d072bb128f1bc888b5f05f62c599

      SHA1

      3d8b53e34818a82656c791fe0796966ca4e09a31

      SHA256

      d5940bd8b4bcbc5873b65177d1296dc1a5f3726f6a04dca2eb4551d6ffcbd124

      SHA512

      74371ef2eef2fea2ea40e3251ec54079cfd6656f38a15c35a8df061e2e77f0e9bc101d876265b8f0b4b2e30ddb4fb2f5ef80c29e73565d4b4cba36ec91f1d66a

    • C:\Users\Admin\AppData\Local\Temp\Rehabilitation

      Filesize

      76KB

      MD5

      2f46d78d0ed4d0a1552d8ea966a45b1f

      SHA1

      410388a370bbc84463c6ba17398714b03cfcdc72

      SHA256

      fc9920323c13d2cd53708c3de96aa3a80b166e7208a41bd4542b0e015752bc1c

      SHA512

      d9a9d7ae14a02286fe2dda8f62eb777b37e39f7ea6a1eff88287aa83617c4e2564cc29e50c11e6be021e1c43209190187e276b8aa16c8121148349e9fe780f94

    • C:\Users\Admin\AppData\Local\Temp\Revolutionary

      Filesize

      72KB

      MD5

      42e695635ad7bd811545be26c29572a9

      SHA1

      99c8737bb7b64257a329496dbf88d23acb2a5521

      SHA256

      486694008a432cd73e9f5d6890d625a3aec23bede3e3546761fc48f779db9a10

      SHA512

      bcd4b2d94903ba44a2cd02ba56dd3d92a071402f22b017646702302a043c742061d6363c6a92f6ab96558a1bbe433dbb3b2eb83af9ba71484df36f41fc1694cd

    • C:\Users\Admin\AppData\Local\Temp\Start

      Filesize

      66KB

      MD5

      6ec8a1b5f12819257d8c4332d4424899

      SHA1

      638a28bded3403d4127056e7bc2b0fa00185dcdb

      SHA256

      6ae03c04ee8463fd72cf021d32d778ffc7e479766ae35f1e9cfa8ed28be90223

      SHA512

      cb47393d9cdb3a7c0aa9b154f0440ed23ce7976fffe2d45fe760ca231d3440f6c8af6977b9cfac34238a84d05b190e8085e410d35d400409892325a42a96dd2b

    • C:\Users\Admin\AppData\Local\Temp\Venture

      Filesize

      54KB

      MD5

      f3efc822c252aa49aabcf3e7ee5e2a46

      SHA1

      de2e1ccf6cc960376feb3db9d034a75319bce79d

      SHA256

      5081274d41930882a6f802629c7f74940aa7080d84dc4e2db88ce81d0f32fe2f

      SHA512

      c279298dd83ecb24bd4a87f52bd0252a30d593a754dcfc4cd61c01a3427d39cf2b937166cd6f5436dc71f6e2efe01a82079b853582df011c88cfd64404d53e30

    • C:\Users\Admin\AppData\Local\Temp\Victoria

      Filesize

      61KB

      MD5

      53d86dbb061d43bc568c93c82f12425b

      SHA1

      d30c5af5c2c61f0db28f0c4b08f62206b7718fcd

      SHA256

      0aaafb7f6da4d4533cf9eb9521fa81cf2fdeb2a1c7e6770da8a694254391f38c

      SHA512

      c3c25f1205e29d24a6a839211b155adaa7d1fe7c4d38d10edd6c98e342485624bbfedc40de7967aa7ebe1a461ebc885ec2752ed6ebc64f7cb4ef3b7530431e24

    • C:\Users\Admin\AppData\Local\Temp\Villages

      Filesize

      51KB

      MD5

      8ce958d40bffa64ff163f649580f5e32

      SHA1

      c24a81d7a2f62cc2016378a57c2476f4a7fc97af

      SHA256

      0fcd1153a66ee801342bdbbf27e73ba3b2a9d522a23e6dfbfb5576df8cda9bcd

      SHA512

      deb6de9edc2e087c341b86815185b17d56390adfcc7f8b305c639d727a010f6b24668eaf2214006ffd8c4431c2b75c5d2cbea4b3530e7aac82e1442b7185ae3c

    • memory/3376-48-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-58-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-49-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-50-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-51-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-52-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-53-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-54-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-55-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-56-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-57-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-47-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-59-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-63-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-62-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-64-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-65-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-66-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-67-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-68-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB

    • memory/3376-69-0x0000000004530000-0x00000000045B2000-memory.dmp

      Filesize

      520KB