Analysis

  • max time kernel
    179s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 15:00

General

  • Target

    f4ec5e3d1c8ba823ffe99a85704db2de.exe

  • Size

    379KB

  • MD5

    f4ec5e3d1c8ba823ffe99a85704db2de

  • SHA1

    beab1d4c708e247acb025da51e8af82bd2c0cebe

  • SHA256

    b5e0c038f3f6f225b402354a607411cf0e41317c4dda0f85f67a591ecc2d48d7

  • SHA512

    b6194b6e9ce21019ddd82431050ef4b9fd91501f6a603e8fb6ea12ae5dfb7e7a70b712c01857ebbbf8704c70babd581c6f9d905382f382608131a5d5a8fe454e

  • SSDEEP

    384:H+b0ZIrceK5eDKe5Teuek41UQFn0FWkorqVsiEsbTGETNkrMX4mT6h8CfskRpwKH:RZRiKFnQoWTxgPC3Yi3iPmbLDC

Malware Config

Extracted

Family

remcos

Botnet

ZUTUPIA

C2

camino432.con-ip.com:1831

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    xasds

  • mouse_option

    false

  • mutex

    cfrtr-FQ2B41

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\f4ec5e3d1c8ba823ffe99a85704db2de.exe
        "C:\Users\Admin\AppData\Local\Temp\f4ec5e3d1c8ba823ffe99a85704db2de.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4052
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\xasds\logs.dat

      Filesize

      144B

      MD5

      2488dd431078e3f741f76315fbc668dc

      SHA1

      9bdb912e9577c4a55e0d879753654f414daf63f3

      SHA256

      3acf727beaed517d250a15565ed800322070e64dee988d90e67634f741ede12c

      SHA512

      689f1a57ffb56ccd723d2b5f8bdc57dc641c9e4748b2b2eb749be83938d2f074dd5765faa84ea1863223aa085480eb4f3bb8910d09ec5ea6bbfdfbbe2f1b2782

    • memory/3020-1095-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3020-1109-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4052-0-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

      Filesize

      4KB

    • memory/4052-1-0x0000000000550000-0x00000000005B2000-memory.dmp

      Filesize

      392KB

    • memory/4052-2-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-3-0x0000000005910000-0x0000000005A2E000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-19-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-23-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-51-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-67-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-65-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-63-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-61-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-59-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-57-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-55-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-53-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-49-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-47-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-43-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-41-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-39-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-35-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-33-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-31-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-29-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-27-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-25-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-21-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-17-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-15-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-13-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-11-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-7-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-5-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-45-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-37-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-9-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-4-0x0000000005910000-0x0000000005A28000-memory.dmp

      Filesize

      1.1MB

    • memory/4052-1078-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-1079-0x0000000005D80000-0x0000000005E18000-memory.dmp

      Filesize

      608KB

    • memory/4052-1080-0x0000000005E20000-0x0000000005E6C000-memory.dmp

      Filesize

      304KB

    • memory/4052-1084-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-1085-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-1086-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-1087-0x0000000074EBE000-0x0000000074EBF000-memory.dmp

      Filesize

      4KB

    • memory/4052-1088-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB

    • memory/4052-1089-0x00000000064C0000-0x0000000006A64000-memory.dmp

      Filesize

      5.6MB

    • memory/4052-1090-0x0000000005F10000-0x0000000005F64000-memory.dmp

      Filesize

      336KB

    • memory/4052-1100-0x0000000074EB0000-0x0000000075660000-memory.dmp

      Filesize

      7.7MB