Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 03:23

General

  • Target

    RETURNED PAYMENT.exe

  • Size

    866KB

  • MD5

    0e8d35f26c96b113928840357f4788d5

  • SHA1

    5033be8a563df919390cfa01e556f671068c9001

  • SHA256

    34d3c312a8cb63c3e7be469f70ec3270b66c7d47cb38ed63a87e27ac1fd9c440

  • SHA512

    998a9a570298332ae09d03f6867bc1b4546da6437b33b252ccbd26ec8a2abd16dc09ac7a933900d3233e71e710ba4bd2c153a789b3eb91231a750518ce63a565

  • SSDEEP

    12288:SgVK7c/UrwH77vvgdLZnHVY5peqDyo+TxG2sxVMbmf9y5o4:SizbjveZnHVK/Dyo+TY4blP

Malware Config

Extracted

Family

remcos

Version

2.7.2 Pro

Botnet

tips

C2

185.140.53.148:1011

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-OZF05G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe
    "C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\glsofWVaFVnYx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp86DE.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4000
    • C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\RETURNED PAYMENT.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp86DE.tmp

    Filesize

    1KB

    MD5

    7df04a522a16ea6266103d8aa254d1c1

    SHA1

    6700a70ed079bdabde099ddea461f53296fdedeb

    SHA256

    0ec2b70f69155f0cb8a9d3ed0f60524a2892dbcbc59b05a0d42018c35d73802c

    SHA512

    3cde93dd08a8e2570adbb1a57d1b3e360ccbbd803074a11bfc74dab5d09ee43bb194b839e9f9df55346e1996c5a61629f5754895eeb0ccbeb1d0b241531259c5

  • C:\Users\Admin\AppData\Roaming\remcos\logs.dat

    Filesize

    74B

    MD5

    ef97eb14b19db3159896885f0e1662c4

    SHA1

    07395fbbcc3b8977aad8b7873722d102ce510601

    SHA256

    2ebcadfa202f99786ceaebec2385dab89fad0752cebcf493414ef648a4819e6d

    SHA512

    294548387788058fb54da7c58f68b460fea05042aea2ed7637ad0c7052caf0affa92db6f4c1302e913dc80b5028d2dea471919263e0abd44a93079086c2c0f56

  • memory/804-28-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-21-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-24-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-25-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-20-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-17-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4668-5-0x0000000005950000-0x000000000595A000-memory.dmp

    Filesize

    40KB

  • memory/4668-9-0x000000007525E000-0x000000007525F000-memory.dmp

    Filesize

    4KB

  • memory/4668-10-0x0000000075250000-0x0000000075A00000-memory.dmp

    Filesize

    7.7MB

  • memory/4668-11-0x0000000006830000-0x000000000688C000-memory.dmp

    Filesize

    368KB

  • memory/4668-8-0x00000000059A0000-0x00000000059AA000-memory.dmp

    Filesize

    40KB

  • memory/4668-7-0x0000000005B80000-0x0000000005BD6000-memory.dmp

    Filesize

    344KB

  • memory/4668-6-0x0000000075250000-0x0000000075A00000-memory.dmp

    Filesize

    7.7MB

  • memory/4668-0-0x000000007525E000-0x000000007525F000-memory.dmp

    Filesize

    4KB

  • memory/4668-4-0x00000000059C0000-0x0000000005A52000-memory.dmp

    Filesize

    584KB

  • memory/4668-3-0x0000000005ED0000-0x0000000006474000-memory.dmp

    Filesize

    5.6MB

  • memory/4668-26-0x0000000075250000-0x0000000075A00000-memory.dmp

    Filesize

    7.7MB

  • memory/4668-2-0x0000000005880000-0x000000000591C000-memory.dmp

    Filesize

    624KB

  • memory/4668-1-0x0000000000E20000-0x0000000000EFE000-memory.dmp

    Filesize

    888KB