Behavioral task
behavioral1
Sample
a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4.exe
Resource
win10v2004-20241007-en
General
-
Target
a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4.exe
-
Size
481KB
-
MD5
f304fc01ee11d8249245b35c4fa4191b
-
SHA1
147a961c90cda69b8acbc12cf07c5d25762b625c
-
SHA256
a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4
-
SHA512
9a924cbc7c47ddd1e0e067a9063ba9b526f224fd6e28e6fe9bcfa5ecd74f6bc2baf509a40cbcb4d6bcb76f0d316c6f165ff834719d2a9dd250d1659c2c55c2ce
-
SSDEEP
12288:LuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSo+DYj:O09AfNIEYsunZvZ19ZTsC
Malware Config
Extracted
remcos
RemoteHost
shlobo.duckdns.org:9687
shlobo.duckdns.org:9374
shlobo.duckdns.org:8764
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-U2TQ1C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4.exe
Files
-
a4e7c1a4bb830c731b60d90c8dea0f01367c3bdc74ae782edfee29507960f2e4.exe.exe windows:5 windows x86 arch:x86
e77512f955eaf60ccff45e02d69234de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsA
GetLongPathNameW
CopyFileW
GetLocaleInfoA
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetTempPathW
OpenProcess
OpenMutexA
lstrcatW
GetCurrentProcessId
GetTempFileNameW
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetTickCount
GlobalUnlock
WriteProcessMemory
ResumeThread
GetThreadContext
ReadProcessMemory
CreateProcessW
SetThreadContext
LocalAlloc
GlobalFree
MulDiv
SizeofResource
QueryDosDeviceW
FindFirstVolumeW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
lstrlenW
GetStdHandle
SetFilePointer
FindResourceA
LockResource
LoadResource
LocalFree
FindVolumeClose
GetVolumePathNamesForVolumeNameW
lstrcpyW
SetConsoleOutputCP
FormatMessageA
FindFirstFileA
AllocConsole
lstrcmpW
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
HeapReAlloc
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetModuleHandleExW
MoveFileExW
LoadLibraryExW
RaiseException
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
MultiByteToWideChar
DecodePointer
EncodePointer
TlsFree
TlsSetValue
GetFileSize
TerminateThread
GetLastError
GetModuleHandleA
RemoveDirectoryW
MoveFileW
SetFilePointerEx
CreateDirectoryW
GetLogicalDriveStringsA
DeleteFileW
FindNextFileA
DeleteFileA
SetFileAttributesW
GetFileAttributesW
FindClose
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
GetModuleHandleW
ExitProcess
GetProcAddress
CreateMutexA
GetCurrentProcess
CreateProcessA
PeekNamedPipe
CreatePipe
TerminateProcess
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
SetEvent
CreateEventW
WaitForSingleObject
Sleep
GetModuleFileNameW
CloseHandle
ExitThread
CreateFileW
WriteFile
FindNextVolumeW
TlsGetValue
TlsAlloc
SwitchToThread
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
SetEndOfFile
user32
DefWindowProcA
TranslateMessage
DispatchMessageA
GetMessageA
GetWindowTextW
wsprintfW
GetClipboardData
UnhookWindowsHookEx
GetForegroundWindow
ToUnicodeEx
GetKeyboardLayout
SetWindowsHookExA
CloseClipboard
OpenClipboard
GetKeyboardState
CallNextHookEx
GetKeyboardLayoutNameA
GetKeyState
GetWindowTextLengthW
GetWindowThreadProcessId
SetForegroundWindow
SetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CreateWindowExA
SendInput
EnumDisplaySettingsW
mouse_event
MapVirtualKeyA
TrackPopupMenu
CreatePopupMenu
AppendMenuA
RegisterClassExA
GetCursorPos
SystemParametersInfoW
GetIconInfo
GetSystemMetrics
CloseWindow
DrawIcon
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
StretchBlt
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
SelectObject
advapi32
LookupPrivilegeValueA
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
RegDeleteKeyA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
shell32
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
ShellExecuteW
ole32
CoInitializeEx
CoGetObject
CoUninitialize
shlwapi
StrToIntA
PathFileExistsW
PathFileExistsA
winmm
mciSendStringA
mciSendStringW
waveInClose
waveInStop
waveInStart
waveInUnprepareHeader
waveInOpen
waveInAddBuffer
waveInPrepareHeader
PlaySoundW
ws2_32
send
WSAStartup
socket
connect
WSAGetLastError
recv
closesocket
inet_ntoa
htons
htonl
getservbyname
ntohs
getservbyport
gethostbyaddr
inet_addr
WSASetLastError
gethostbyname
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipAlloc
GdiplusStartup
GdipGetImageEncoders
GdipLoadImageFromStream
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipCloneImage
wininet
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ