Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 16:33 UTC

General

  • Target

    Backdoor.exe

  • Size

    92KB

  • MD5

    4af287a83510d3a36ee2e591801aae74

  • SHA1

    bdc1a2e9594f7650bcc47711e71f41f1cf0d6bf6

  • SHA256

    40d8e8b88f224bc5b0686b0154ccec7173ea1251244aff66ecdf1788dc4879cd

  • SHA512

    f7c47f734e231206dae6e2b55b8cbaaa7ba01b7c09c15a7f080e7f9a65b8a9c0b7bdaa3c4d66ed34b101af03b98e8d6ede6d022450907024bd6de88eaef25a3d

  • SSDEEP

    1536:AhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6NrT:GhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+a

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

74.215.232.65:6060

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_axwfyanmhaeeahv

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Backdoor.exe
    "C:\Users\Admin\AppData\Local\Temp\Backdoor.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\PING.EXE
        PING 127.0.0.1 -n 2
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2280
      • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
        "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2384

Network

    No results found
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
  • 74.215.232.65:6060
    iexplore.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.bat

    Filesize

    99B

    MD5

    76c1687d97dfdbcea62ef1490bec5001

    SHA1

    5f4d1aeafa7d840cde67b76f97416dd68efd1bed

    SHA256

    79f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4

    SHA512

    da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925

  • \Users\Admin\AppData\Roaming\remcos\remcos.exe

    Filesize

    92KB

    MD5

    4af287a83510d3a36ee2e591801aae74

    SHA1

    bdc1a2e9594f7650bcc47711e71f41f1cf0d6bf6

    SHA256

    40d8e8b88f224bc5b0686b0154ccec7173ea1251244aff66ecdf1788dc4879cd

    SHA512

    f7c47f734e231206dae6e2b55b8cbaaa7ba01b7c09c15a7f080e7f9a65b8a9c0b7bdaa3c4d66ed34b101af03b98e8d6ede6d022450907024bd6de88eaef25a3d

  • memory/2384-14-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.