Analysis
-
max time kernel
1354s -
max time network
1143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
Remcos v5.1.3 Light.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Remcos v5.1.3 Light.exe
Resource
win10v2004-20240910-en
General
-
Target
Remcos v5.1.3 Light.exe
-
Size
38.4MB
-
MD5
1a787dacd4ac908241f677303af69d6f
-
SHA1
fa57edb0b2e21e8a55602cb96809efcfcfee65c1
-
SHA256
4098c759068a197e9b5236af09fc8344da2d0d8d8a3fd4c17824160b1afea5a0
-
SHA512
a6d0a770e9c425fa9f28a99e81a4f630c362692b9c4c623963871b2de992f5e10c035e1d23e1e8dbcd729777fa630801bf4998f7d83d245d353470353d71b650
-
SSDEEP
786432:WIXQNSBAVi1Bs2DuYr3jxkQNk58issVWhJDS3IWgrAfUPE+szJFjU:WIXQgAVi1eQ3jnm8ihADnrAuE3HA
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1504 Remcos v5.1.3 Light.exe 1504 Remcos v5.1.3 Light.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 3848 WerFault.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remcos v5.1.3 Light.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1696 EXCEL.EXE 220 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 Remcos v5.1.3 Light.exe 1504 Remcos v5.1.3 Light.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 220 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4240 unregmp2.exe Token: SeCreatePagefilePrivilege 4240 unregmp2.exe Token: SeShutdownPrivilege 3848 wmplayer.exe Token: SeCreatePagefilePrivilege 3848 wmplayer.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 3848 wmplayer.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe 220 vlc.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1504 Remcos v5.1.3 Light.exe 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 1696 EXCEL.EXE 220 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3848 wrote to memory of 3456 3848 wmplayer.exe 114 PID 3848 wrote to memory of 3456 3848 wmplayer.exe 114 PID 3848 wrote to memory of 3456 3848 wmplayer.exe 114 PID 3456 wrote to memory of 4240 3456 unregmp2.exe 115 PID 3456 wrote to memory of 4240 3456 unregmp2.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remcos v5.1.3 Light.exe"C:\Users\Admin\AppData\Local\Temp\Remcos v5.1.3 Light.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2532
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 28802⤵
- Program crash
PID:2000
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3848 -ip 38481⤵PID:1248
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\CheckpointSearch.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1696
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DisableAdd.mp4v"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5b329979a534a47e4381448265b867bb0
SHA18623145d1f06430662a2304e50cff646b7551d2e
SHA2565f785ceee7336194384e68adb44509ee2787857786c15b58f054024543b423f3
SHA512b2359a8740387142a603e3b84e6da9771f67eda3346b60a7cba0a52882ea5f8eca0abf8006143f0975ba3617b26897c3fe22822852a210883c213a20c8fb8346
-
Filesize
1024KB
MD549c8a0bd4e95b7f0d0a0cbd7b24fb59f
SHA19cd7b808fbf0ee6e1024efba2ff322f453b997e7
SHA2562f48a8fc3202a92a645d28ce39eeee6fdbc055ade7354345a6f5f086dc4925ce
SHA5126288d72fa2eca4da0818c3ddc706406e28f468eda7707d67a35ce544417d3df3f75e0ea1a71f5db2b2e013613a4c9ef584eccedd168dd930c2f7162320432e6d
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5f8403ed9075e0883edb7958948eaa4b9
SHA129988b20df01d4304fd6d52929e1d458b69e11ac
SHA256edc1582fbd70eb0dfe120f23751cff4b1b24d3509eb44723a975896633d1ad16
SHA512365eda5e6eccc55349ce02e84adaf58b694668452ff020b5ff22336dc7bf603649e1d353c7716c9f2f58e2c304fd20bd70560c4fc07f50fcfc95aec3662bc353
-
Filesize
385B
MD5f3baa24b9005b64655aabfc7847acb6b
SHA18f38ff6290a99ce782dabee3589f7dadc55610ee
SHA25682133c648058213d2f8c3520bf92daefaed4f47b114fb8b0040d484ffa13a6de
SHA5127323dc399dcb3b729fd315fdcd089604d9b88ec283b14d4b9357972b53f9abdc475498d78c9b9fd84762354fd451f99494d5d308f2ce7675447ce9c7b6495155
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD50b744564abbf513296c66c0a04d1e4a4
SHA197b400ff5a5a0f15cc97c2a0455cb4988a723637
SHA2564eab2916eeb89c88097d3b69983543cd358f1391ba1cf267a9e0c89ccfe3922f
SHA51204767aa1ada78c0de87a2923d9e7e6397a99d2413149767a557f7d26d4dfc420852a7d72b49bc436e15eb84d28fe3d547b58e9a2617beca25f0bfa81affe35cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD53cfab9e1b83bf8a27d4233ce7ee082f7
SHA154dd2d24ba0b0cc3d4ab4e1a208125c727b08383
SHA256340cd6517496e0535278e5862b1e0e4fa2fbb572b9e7c4da0714ee4d6bfe9136
SHA51246173d6d1d0319351bf782034e3ea2f52185b00648c9f501de06b3f03ef4f0cd7844c67b866854aedde098cc08d052b6d6575c49faa2302e78b1b0875645d071