Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 03:23

General

  • Target

    RETURNED PAYMENT.exe

  • Size

    866KB

  • MD5

    0e8d35f26c96b113928840357f4788d5

  • SHA1

    5033be8a563df919390cfa01e556f671068c9001

  • SHA256

    34d3c312a8cb63c3e7be469f70ec3270b66c7d47cb38ed63a87e27ac1fd9c440

  • SHA512

    998a9a570298332ae09d03f6867bc1b4546da6437b33b252ccbd26ec8a2abd16dc09ac7a933900d3233e71e710ba4bd2c153a789b3eb91231a750518ce63a565

  • SSDEEP

    12288:SgVK7c/UrwH77vvgdLZnHVY5peqDyo+TxG2sxVMbmf9y5o4:SizbjveZnHVK/Dyo+TY4blP

Malware Config

Extracted

Family

remcos

Version

2.7.2 Pro

Botnet

tips

C2

185.140.53.148:1011

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-OZF05G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe
    "C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\glsofWVaFVnYx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB358.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2544
    • C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe"
      2⤵
        PID:2672
      • C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB358.tmp

      Filesize

      1KB

      MD5

      05088fa8efcc3a4a82ce6ee9ccb4809b

      SHA1

      d6a58372856e3abddced348f49aa6d465fe1c416

      SHA256

      71283bfa5617c8ccaab7e0767aa9418f32be75f36978170c081698e58d1c00b1

      SHA512

      7351f848aaf784706998a25b92f3ea2cae68ac0a9211ec6a6a99c77caf975262a072de00dfe857453957d1093b2021388d121150c47db533a7b4f6129476a6e1

    • C:\Users\Admin\AppData\Roaming\remcos\logs.dat

      Filesize

      74B

      MD5

      2ae26a4eb1c843aac087180b16adb64e

      SHA1

      47639a5879dc6fc5f6a5917af5a5bb3ee408c9d9

      SHA256

      495a1fe16b2079a6592c5f0b6cf0388b35d2de0cac3a7c208a5a6fafb641445c

      SHA512

      59018997b9a182da43cd68bf6f31c2b5182bb5f555bafc0d6ed56c8db724604139e03f0ebbd11644669ee7470f4a30a671d59f2dc74b0065cf11b0d1f3a4b234

    • memory/2384-0-0x00000000740CE000-0x00000000740CF000-memory.dmp

      Filesize

      4KB

    • memory/2384-1-0x0000000001260000-0x000000000133E000-memory.dmp

      Filesize

      888KB

    • memory/2384-2-0x00000000005C0000-0x00000000005CA000-memory.dmp

      Filesize

      40KB

    • memory/2384-3-0x00000000740C0000-0x00000000747AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2384-4-0x00000000740CE000-0x00000000740CF000-memory.dmp

      Filesize

      4KB

    • memory/2384-5-0x00000000740C0000-0x00000000747AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2384-6-0x0000000004940000-0x000000000499C000-memory.dmp

      Filesize

      368KB

    • memory/2384-27-0x00000000740C0000-0x00000000747AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2608-24-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2608-20-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-18-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-16-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-14-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-13-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-31-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-28-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-26-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2608-12-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB