Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 10:11
Behavioral task
behavioral1
Sample
Trojan.Win32.Remcos.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Remcos.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Remcos.exe
-
Size
469KB
-
MD5
22ce3d0fc9f92829be87f978fc573680
-
SHA1
2a55144aed0886304b490fbcc623be46a8871065
-
SHA256
8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
-
SHA512
6bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSEn9:WiLJbpI7I2WhQqZ7E9
Malware Config
Extracted
remcos
COM Surrogate
stay-daughters.gl.at.ply.gg:43206
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
COM Surrogate.exe
-
copy_folder
COM Surrogate
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows
-
mouse_option
false
-
mutex
Rmc-C5SENV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
COM Surrogate
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 1808 COM Surrogate.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 cmd.exe 3068 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" Trojan.Win32.Remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" Trojan.Win32.Remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1808 set thread context of 2816 1808 COM Surrogate.exe 34 PID 2816 set thread context of 2268 2816 iexplore.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Remcos.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1808 COM Surrogate.exe 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2464 2856 Trojan.Win32.Remcos.exe 30 PID 2856 wrote to memory of 2464 2856 Trojan.Win32.Remcos.exe 30 PID 2856 wrote to memory of 2464 2856 Trojan.Win32.Remcos.exe 30 PID 2856 wrote to memory of 2464 2856 Trojan.Win32.Remcos.exe 30 PID 2464 wrote to memory of 3068 2464 WScript.exe 31 PID 2464 wrote to memory of 3068 2464 WScript.exe 31 PID 2464 wrote to memory of 3068 2464 WScript.exe 31 PID 2464 wrote to memory of 3068 2464 WScript.exe 31 PID 3068 wrote to memory of 1808 3068 cmd.exe 33 PID 3068 wrote to memory of 1808 3068 cmd.exe 33 PID 3068 wrote to memory of 1808 3068 cmd.exe 33 PID 3068 wrote to memory of 1808 3068 cmd.exe 33 PID 1808 wrote to memory of 2816 1808 COM Surrogate.exe 34 PID 1808 wrote to memory of 2816 1808 COM Surrogate.exe 34 PID 1808 wrote to memory of 2816 1808 COM Surrogate.exe 34 PID 1808 wrote to memory of 2816 1808 COM Surrogate.exe 34 PID 1808 wrote to memory of 2816 1808 COM Surrogate.exe 34 PID 2816 wrote to memory of 2268 2816 iexplore.exe 35 PID 2816 wrote to memory of 2268 2816 iexplore.exe 35 PID 2816 wrote to memory of 2268 2816 iexplore.exe 35 PID 2816 wrote to memory of 2268 2816 iexplore.exe 35 PID 2816 wrote to memory of 2268 2816 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Remcos.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Remcos.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\COM Surrogate\COM Surrogate.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\ProgramData\COM Surrogate\COM Surrogate.exe"C:\ProgramData\COM Surrogate\COM Surrogate.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2268
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD522ce3d0fc9f92829be87f978fc573680
SHA12a55144aed0886304b490fbcc623be46a8871065
SHA2568741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
SHA5126bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c
-
Filesize
530B
MD5a00100a7ea7ceb20ea20ea1df0414428
SHA18ea3cc19504868cc737fcd91bc67da649b7d3e8a
SHA2565081344df7d96adaefb31d2ec36e6c4e3be7f0286f4223352c24988253d32504
SHA5123cfd0bec1feb0ebcfbebb67301d4925432758b5478bfb06d25c2a2434a136e922af28c1fe27f79e89f9ea2e40640e883ee485c56b8ba540d020aa9e3678b6339
-
Filesize
414B
MD501ea74daf9b956185c45016b68449bb0
SHA19d1a18d2c9a9f5ee04dc864adcd92f05577e9392
SHA2561b22904a4106604da03fd63fad1663a3562f928fbe6bfc90af4b8239142e83da
SHA51235566d72fc5739044bcb0ff14741c25aa0892fb6de57831eca737eb6896cd9c1c0837133504cf8df415a8e66196c317b86123967507d39814d3faaf989f8da02