Analysis

  • max time kernel
    180s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 14:30

General

  • Target

    12c18cd1ea269e5de23ad4a94d8c3b3b.exe

  • Size

    121KB

  • MD5

    12c18cd1ea269e5de23ad4a94d8c3b3b

  • SHA1

    bff73ffd9c9806ae525e1cde0f415cd3a5103f38

  • SHA256

    fa7a8dde8997e3a40bca2128ef2d46254a40dba0baa78a675e4b881b7583054f

  • SHA512

    390c1ea942d7249e8b2ef22efd0261e0a55b9663abc5806e281f72e40effe1cf218a907ccc9e5acc3b449978ec2d7ec5d2a116cd713f9d60901f019d805cfb84

  • SSDEEP

    3072:Myq9CdFY/haU5DPji+JKVnYejf+KyVflH:Rq0PY/haQOxnHT+KS

Malware Config

Extracted

Family

remcos

Botnet

ZAPATO

C2

compu8883.con-ip.com:1836

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    najsjjjdjsjdkfgg-P7FLZT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\12c18cd1ea269e5de23ad4a94d8c3b3b.exe
        "C:\Users\Admin\AppData\Local\Temp\12c18cd1ea269e5de23ad4a94d8c3b3b.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4960
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      6cc6faac16c0b4ecc4a9195b128ca542

      SHA1

      11ddbe709cddbce9789a88811e84b79361796efb

      SHA256

      ab4035b8c2d00a6ecf93ed0b59f171ad67fc914ddfd2c58405757c7f8948e55f

      SHA512

      e8d1e0dc1feeec71b6b20177525909482abdff8a321d82e3f731ff0e44de06cb55b478388820c88234b9dabda337fa1d5230d2a9669d7004e4d1e78ca45df134

    • memory/2400-1099-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2400-1108-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4960-0-0x00000000744DE000-0x00000000744DF000-memory.dmp

      Filesize

      4KB

    • memory/4960-1-0x0000000000D60000-0x0000000000D82000-memory.dmp

      Filesize

      136KB

    • memory/4960-2-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB

    • memory/4960-3-0x00000000059B0000-0x00000000059B6000-memory.dmp

      Filesize

      24KB

    • memory/4960-4-0x00000000064C0000-0x00000000065DE000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-24-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-22-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-66-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-68-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-64-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-60-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-58-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-54-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-52-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-50-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-48-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-46-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-44-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-40-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-38-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-36-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-34-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-32-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-30-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-28-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-26-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-20-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-18-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-16-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-12-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-10-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-62-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-56-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-42-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-14-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-8-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-6-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-5-0x00000000064C0000-0x00000000065D8000-memory.dmp

      Filesize

      1.1MB

    • memory/4960-1079-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB

    • memory/4960-1081-0x0000000006910000-0x000000000695C000-memory.dmp

      Filesize

      304KB

    • memory/4960-1080-0x0000000006830000-0x00000000068C8000-memory.dmp

      Filesize

      608KB

    • memory/4960-1082-0x00000000071C0000-0x0000000007764000-memory.dmp

      Filesize

      5.6MB

    • memory/4960-1083-0x00000000069A0000-0x00000000069F4000-memory.dmp

      Filesize

      336KB

    • memory/4960-1088-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB

    • memory/4960-1091-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB

    • memory/4960-1090-0x00000000744DE000-0x00000000744DF000-memory.dmp

      Filesize

      4KB

    • memory/4960-1089-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB

    • memory/4960-1100-0x00000000744D0000-0x0000000074C80000-memory.dmp

      Filesize

      7.7MB