Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
673d693b0c8b68503d64ed15fd863d61.exe
Resource
win7-20240903-en
General
-
Target
673d693b0c8b68503d64ed15fd863d61.exe
-
Size
1017KB
-
MD5
673d693b0c8b68503d64ed15fd863d61
-
SHA1
4fb6b11e933354b9f7c5bda096543a5d6b56ff83
-
SHA256
a77754ef6de4a61024e443178b88e50be8b1994f87b323ed7fa5f2f197acdab4
-
SHA512
3996083d6b2f207e742a81a1dd11277c1bdb2631438a0ee72eeec88a57ff39fb2a7c9a100b30bc2839519c3019129d2157e89d6ade8cc326c4073daf4cc2bd27
-
SSDEEP
24576:myN887MU2cPnNupjbW/5OheoofVmhGmfCtquly:myNVQUPNudihOhRdhHIqul
Malware Config
Extracted
remcos
IRN
irnserv1.ddns.net:4424
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-CA8761
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2908 powershell.exe 1672 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2956 remcos.exe 1884 remcos.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 673d693b0c8b68503d64ed15fd863d61.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-CA8761 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 673d693b0c8b68503d64ed15fd863d61.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-CA8761 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-CA8761 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-CA8761 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 673d693b0c8b68503d64ed15fd863d61.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2100 set thread context of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2956 set thread context of 1884 2956 remcos.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 673d693b0c8b68503d64ed15fd863d61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 673d693b0c8b68503d64ed15fd863d61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2908 powershell.exe 1672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1884 remcos.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2908 2100 673d693b0c8b68503d64ed15fd863d61.exe 31 PID 2100 wrote to memory of 2908 2100 673d693b0c8b68503d64ed15fd863d61.exe 31 PID 2100 wrote to memory of 2908 2100 673d693b0c8b68503d64ed15fd863d61.exe 31 PID 2100 wrote to memory of 2908 2100 673d693b0c8b68503d64ed15fd863d61.exe 31 PID 2100 wrote to memory of 2304 2100 673d693b0c8b68503d64ed15fd863d61.exe 32 PID 2100 wrote to memory of 2304 2100 673d693b0c8b68503d64ed15fd863d61.exe 32 PID 2100 wrote to memory of 2304 2100 673d693b0c8b68503d64ed15fd863d61.exe 32 PID 2100 wrote to memory of 2304 2100 673d693b0c8b68503d64ed15fd863d61.exe 32 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2100 wrote to memory of 2836 2100 673d693b0c8b68503d64ed15fd863d61.exe 35 PID 2836 wrote to memory of 2956 2836 673d693b0c8b68503d64ed15fd863d61.exe 36 PID 2836 wrote to memory of 2956 2836 673d693b0c8b68503d64ed15fd863d61.exe 36 PID 2836 wrote to memory of 2956 2836 673d693b0c8b68503d64ed15fd863d61.exe 36 PID 2836 wrote to memory of 2956 2836 673d693b0c8b68503d64ed15fd863d61.exe 36 PID 2956 wrote to memory of 1672 2956 remcos.exe 37 PID 2956 wrote to memory of 1672 2956 remcos.exe 37 PID 2956 wrote to memory of 1672 2956 remcos.exe 37 PID 2956 wrote to memory of 1672 2956 remcos.exe 37 PID 2956 wrote to memory of 2624 2956 remcos.exe 39 PID 2956 wrote to memory of 2624 2956 remcos.exe 39 PID 2956 wrote to memory of 2624 2956 remcos.exe 39 PID 2956 wrote to memory of 2624 2956 remcos.exe 39 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41 PID 2956 wrote to memory of 1884 2956 remcos.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\673d693b0c8b68503d64ed15fd863d61.exe"C:\Users\Admin\AppData\Local\Temp\673d693b0c8b68503d64ed15fd863d61.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mDBLQPaU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mDBLQPaU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF6FC.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\673d693b0c8b68503d64ed15fd863d61.exe"C:\Users\Admin\AppData\Local\Temp\673d693b0c8b68503d64ed15fd863d61.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mDBLQPaU.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mDBLQPaU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp29BF.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD579645d2ab14862cb19639fa6f2825a17
SHA15e7c5864c9da1c46109fa86b96c66da885360e13
SHA256c6970136ef111b994f3466e0cd19797ea5bb0c557d5be10cd650f7a1237c1414
SHA5125aa49ea21650b742677c24c3ea4344a9f245b5356d0ea2c1f337de3c10e6b2e1b9d5aa0fcace9266fdee49f29f7bee55bcc1717fd5d94b02ef606a5c795ff7bf
-
Filesize
1017KB
MD5673d693b0c8b68503d64ed15fd863d61
SHA14fb6b11e933354b9f7c5bda096543a5d6b56ff83
SHA256a77754ef6de4a61024e443178b88e50be8b1994f87b323ed7fa5f2f197acdab4
SHA5123996083d6b2f207e742a81a1dd11277c1bdb2631438a0ee72eeec88a57ff39fb2a7c9a100b30bc2839519c3019129d2157e89d6ade8cc326c4073daf4cc2bd27
-
Filesize
1KB
MD528f26ba334ede40d3a700c255838e799
SHA114b680f0e65251fdbdebb41a8da60d98a47e2d89
SHA2561b8be703bc200f2f2daf9e705c84c1a9d85718d8509e008d626e023160acc586
SHA512dd1067055bed5a1b74c47e28bea3b5c4a327be74618701717c7d091193016944deabaa010b310aec16c3a11ef31a8a9100a1c0378872ce098f8aaa98694e2d44
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD569d84c902908bd9031078affed441859
SHA1944b4064992684698150d26bc588f1ba326f1622
SHA25666969e59a1019f5cdd49bf2cfdee8426feb8acebca6df6ebf3bbb0e9d8fd40e8
SHA512271b26c2d80348f19feb01678f4b37108f833cd49cf984b2265f6d1eee7d04d3d79977d7e7b18d8171240ecded33d9a0d1df8185d7d29ced933fee4edc3094b2