Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 05:54

General

  • Target

    XTU_7.13.1.5/XTUSetup_7.13.1.5.exe

  • Size

    3.0MB

  • MD5

    66077408ca68b2fcd2a80e86e1797900

  • SHA1

    7c20e8699629a2363ad3795248dbb19a07ea68e8

  • SHA256

    72d6634536e28daf1008d949c3683ee5a31bffeeabe5443a84b5023c5ee48470

  • SHA512

    f02864e4201caa2427942cd97e5a834cdd82cab766f3e85e42f8f87e66e220d93c567497f248bfb8e946c1bd5e5f599bad7a991a85a36d2920c696e5e2a909bb

  • SSDEEP

    49152:ZEA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTVd3338e:t92bz2Eb6pd7B6bAGx7n333J

Malware Config

Extracted

Family

remcos

Botnet

NewTest

C2

65.21.12.146:6165

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    GttttSFFFSSS-FH61YW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe
      "C:\Users\Admin\AppData\Local\Temp\XTU_7.13.1.5\XTUSetup_7.13.1.5.exe" /VERYSILENT
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe
        "C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\Temp\{1FA9BC17-C740-41A0-ACA3-EC71BC50E5CA}\.cr\XTUSetup_7.13.1.5.exe
          "C:\Windows\Temp\{1FA9BC17-C740-41A0-ACA3-EC71BC50E5CA}\.cr\XTUSetup_7.13.1.5.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe" -burn.filehandle.attached=532 -burn.filehandle.self=540
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4360
      • C:\Users\Admin\AppData\Roaming\ICQ.exe
        "C:\Users\Admin\AppData\Roaming\ICQ.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\114ae055

    Filesize

    1.1MB

    MD5

    3f75119bed7b8ffb2f2a5df7d013d8d7

    SHA1

    0aff60decf4528185205b4659152f4744f7256cd

    SHA256

    786e07efc1b5b9f334068b4468402145c378a68f93833c62b652064b8737dea9

    SHA512

    673d40e8c560cdea07ceeb556d369ca380ed5182e2cdda3d0b7c64b9bc508d3f0a7603ac22badb63989e5c9a7fd8bcd64eb27dc0467d87b9849c8375cf2e18b8

  • C:\Users\Admin\AppData\Roaming\ICQ.exe

    Filesize

    168KB

    MD5

    aef6452711538d9021f929a2a5f633cf

    SHA1

    205b7fab75e77d1ff123991489462d39128e03f6

    SHA256

    e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac

    SHA512

    7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7

  • C:\Users\Admin\AppData\Roaming\MCoreLib.dll

    Filesize

    106KB

    MD5

    815b07c37c83b13457d37ca8c6a7a561

    SHA1

    746138b85e5611fd058c008411889a15870083cd

    SHA256

    153c1b5e96e7bc4c9f858c3cc3bc6cd5e09ef68776d95871ca38824c430654c4

    SHA512

    8949ab1deae036ae785ad20c634519aa368b4768f0dd65c0dc53f8ea70dd7d707c984277b914de14054eb8a044182ff78205e3a02555e377750bb829760b8c31

  • C:\Users\Admin\AppData\Roaming\MDb.dll

    Filesize

    205KB

    MD5

    580fdcf4c38b155708fcfc2fc375b287

    SHA1

    63d689b601037f7a272cfc3b88fcd892d7391764

    SHA256

    2e5f2d3e4544b318152ee7b00a47f664b7414941ae284deb41ead1f09ac63475

    SHA512

    a691ce52cf62410148ff9a8e83f43930601d2053f0b0516f1923e9e5408d7a78a6eafb843c61078a3b99993fa616c612fdffc6d836599793c56984fa8d0519fc

  • C:\Users\Admin\AppData\Roaming\MKernel.dll

    Filesize

    219KB

    MD5

    98a71909605b7d088f82d66abc64d4c2

    SHA1

    1e250127851a331dd914215348ef51fff78442c9

    SHA256

    46410947d60a8b92869aa2cf27b57a94c710047f168ac3bc23879a8461f8686a

    SHA512

    efa8e407e3fbfb81da07b584b8bbd2a440074388ae3ff6175abc88614b42b53ca70206e7ada00273457fafac58d7729f1c945a9e79ce793bc48229035194b267

  • C:\Users\Admin\AppData\Roaming\MUICoreLib.dll

    Filesize

    824KB

    MD5

    60a5383ba17d8f519cb4356e28873a14

    SHA1

    6bf70393d957320a921226c7fcdf352a0a67442d

    SHA256

    80878e4543959b63cbd87e3ebb82f4988cbbdf9da564370aa15410783c5f343f

    SHA512

    a0e0ef1d821e13977d14a806357128285edc0a26c01dcf9fd99e7c62f8efccdf608b1c0dceb1f3f40e988692eb549e22193d9ce253a1c0c1d8b10c46955bee12

  • C:\Users\Admin\AppData\Roaming\MUIUtils.dll

    Filesize

    385KB

    MD5

    97d6efb8b8e0b0f03701a7bafc398545

    SHA1

    0fe11e0b7f47fdec9aaa98b83728c125409e9d5b

    SHA256

    51c8715fac6797b7f962a68903f1f994c2af1088ac31972b5e512dab5ab4fd8e

    SHA512

    2bf8935ad96f35586be6074e8798fa36ee13a05cef05aa0df120ef6800cc1d941310c672894d2380b87c7491663c137fa5bcade4a732bcc6448ba3bf0badb2d7

  • C:\Users\Admin\AppData\Roaming\MUtils.dll

    Filesize

    619KB

    MD5

    6da9a492898b66db78f5c9d3fc7ecc64

    SHA1

    d264f67d92ccd4cfeaed1510ed0b6ae90d3f7db4

    SHA256

    50dfc607913a47dd266e27f6533f3f6b8f9fe995582f7662a944149a26b5054c

    SHA512

    11bc138d16f279d70ece09e3d238ce891bc5015b6d49a750e153c2b9286bf95e285e818ed5e25e7c731cdfff1324cdb74155f68fda0ef8104eb0d554e2b2923e

  • C:\Users\Admin\AppData\Roaming\XTUSetup_7.13.1.5\XTUSetup_7.13.1.5.exe

    Filesize

    50.0MB

    MD5

    d6e27788acf558b6d808443bf7ba1256

    SHA1

    ded76dab63c1c9e8ccf381451b51f834884017a8

    SHA256

    a7d8a8d0b3946412afd642b5b4a01e0133103e0ec0306a3f03c2b35c060e1dfb

    SHA512

    09d7eb314566f11a21ad29aa94c4a0ab02644604e2a554057a6b9854245ec78a882731975411b777c1d3713853d352fdc3c162bf25e5f6d84fbb81a3b5b0e9db

  • C:\Users\Admin\AppData\Roaming\barbotine.pdf

    Filesize

    1.0MB

    MD5

    ebf03a3293b0cbc2c7c21168bd82dd2c

    SHA1

    13a7741fba973678cff14d45f180917d2d49afa3

    SHA256

    d2eb81404ee8f8f27fa20fe23f0c6258135a93295f4fb1f0fa10aeb1e5f5e617

    SHA512

    5937ad7d89c84da5191c8910da3cd6e909d95f3b78f87b3a6db1d1b82e7b65dd3d734be73f0ecdc8bde084feacb5776038bc32ae620aac630b6dc08be5d47dd7

  • C:\Users\Admin\AppData\Roaming\coolcore49.dll

    Filesize

    764KB

    MD5

    4f27d1bacaf09d1919484355b341c868

    SHA1

    f1be78d484235270a1416c6acb20e2915ae050db

    SHA256

    12cddd3c62ff777f1738226fe0b4b36c8170e5e1c0c47fb5913f1a780dc5f450

    SHA512

    328277fe18d2bbc11160d0c239c90e94d2689b8dbefb6fe46febb730fbcc6e18ced429f839d7a81d8e1b42fe4c1cb4afaaa5745353daf271ac21984f5c67aced

  • C:\Users\Admin\AppData\Roaming\msvcp71.dll

    Filesize

    488KB

    MD5

    561fa2abb31dfa8fab762145f81667c2

    SHA1

    c8ccb04eedac821a13fae314a2435192860c72b8

    SHA256

    df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b

    SHA512

    7d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43

  • C:\Users\Admin\AppData\Roaming\msvcr71.dll

    Filesize

    340KB

    MD5

    86f1895ae8c5e8b17d99ece768a70732

    SHA1

    d5502a1d00787d68f548ddeebbde1eca5e2b38ca

    SHA256

    8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

    SHA512

    3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

  • C:\Users\Admin\AppData\Roaming\xprt6.dll

    Filesize

    244KB

    MD5

    d145903e217ddde20ce32ed9e5074e16

    SHA1

    bdb3265d872f446d7445aae4f2d0beba5dae3bd8

    SHA256

    9317971d3615415691420d06b06de89b67aea164877b74e308bb9c338ca0eca4

    SHA512

    00e7df32ab3c8a46b4e8761634ddeac28410f46a9312923f46b1d83376d69489653763661f2c51ac9f85028a11d8496c911eabcb55a19222caf311be61504666

  • C:\Windows\Temp\{1FA9BC17-C740-41A0-ACA3-EC71BC50E5CA}\.cr\XTUSetup_7.13.1.5.exe

    Filesize

    648KB

    MD5

    ea95350eb108975eb9fb296847041831

    SHA1

    473c594c0b180a68fdb75b55967336cd458e1d3b

    SHA256

    cf55a194e974042437a475531c287df2c99de94d2d862d7c7525be02bea1163e

    SHA512

    9e73c24c8f8501accf7705fb721fb44e2449c3a211fbf9e3f57c796c7b17ac02b204834a3d34083fbdc32a6d999edaa2b14934d3d66cf3647e3fa4993ba3d97a

  • C:\Windows\Temp\{BB56E7B2-67A4-44AF-B793-5252B63BF80E}\.ba\logo.png

    Filesize

    3KB

    MD5

    9c2693cd6944a2d82e82c8a50c33bf3c

    SHA1

    1faeb91c36d2c4e97d57800cdf08d68d434e5550

    SHA256

    96116bfefabee7cae5090d9f0d8538123a9b21d1251591def8f3608ca6823292

    SHA512

    54d5d12609afd75338f577b909191db5ec55d27d00920b45ca89e5726f1097e237068b76a7676686d759ed1ebc38874bdda6a65afcfd0b19e86dbf23b4251844

  • C:\Windows\Temp\{BB56E7B2-67A4-44AF-B793-5252B63BF80E}\.ba\wixstdba.dll

    Filesize

    203KB

    MD5

    0ba387d66175c20452de372f8dbb79fe

    SHA1

    5411d41a7d88291b97fb9573eb6448c72e773b70

    SHA256

    7b3d4a22a56cd80f19c48a321f978f728d34b8227cdc7fcadeb76b7506b2bb33

    SHA512

    13ec6e6ddc602e8053aadd4dd84ed87c23b581f2a41d738e32a522128ca4985dcfcaedc7fab192085f0eb4facd1cd7ad91ccaf8505491e29288d2f66cbf705fd

  • memory/336-70-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/336-3-0x00000000008D0000-0x00000000008D1000-memory.dmp

    Filesize

    4KB

  • memory/2176-0-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

    Filesize

    4KB

  • memory/2176-4-0x0000000000400000-0x000000000070A000-memory.dmp

    Filesize

    3.0MB

  • memory/2356-98-0x00007FF9BBBD0000-0x00007FF9BBDC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-111-0x0000000073A70000-0x0000000073BEB000-memory.dmp

    Filesize

    1.5MB

  • memory/2392-61-0x0000000000A00000-0x0000000000A63000-memory.dmp

    Filesize

    396KB

  • memory/2392-64-0x0000000000A70000-0x0000000000B41000-memory.dmp

    Filesize

    836KB

  • memory/2392-93-0x0000000073A70000-0x0000000073BEB000-memory.dmp

    Filesize

    1.5MB

  • memory/2392-94-0x00007FF9BBBD0000-0x00007FF9BBDC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-95-0x0000000073A70000-0x0000000073BEB000-memory.dmp

    Filesize

    1.5MB

  • memory/3452-113-0x00007FF9BBBD0000-0x00007FF9BBDC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-114-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-116-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-117-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-118-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-119-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-120-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-121-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-122-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-123-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-124-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-125-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/3452-126-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB