Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 17:35

General

  • Target

    RacingLot.exe

  • Size

    1.2MB

  • MD5

    8b55759c053ec89dc1eae85d043441a9

  • SHA1

    af350e100dc7178de3bc1c166599e99ae29268ee

  • SHA256

    b66989ce2388271f471e38dd4f8cca5da3a47663dcb253e77e464ac7328c1a32

  • SHA512

    c4815afd42a620201c34aa7dae33990ae085fd76ce181a9e2b1bd2fbdb7e9841495f96b56f03a5bba818f95df61df8d809fe25aa623274257ce14da78d2b627a

  • SSDEEP

    24576:E4t5TY9aBRuxpPk92C48uKcuNaHHP/Wx4wbdqXReE9UOsPhv1daUsC:5YaBRuxu9r4XKc/HHP/WxHbwoEGH0s

Malware Config

Extracted

Family

remcos

Botnet

azucar

C2

comercio0025.dns.army:3021

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    datos

  • mouse_option

    false

  • mutex

    uyebwiljbflbhvghhsd-PB673X

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\RacingLot.exe
        "C:\Users\Admin\AppData\Local\Temp\RacingLot.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Demo Demo.cmd & Demo.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1780
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2052
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1732
          • C:\Windows\SysWOW64\findstr.exe
            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2648
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 88473
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2600
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "partitionhansenincorporatemichigan" Classics
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3048
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Mat + ..\Customize + ..\Downloadcom + ..\Damn + ..\Stylus + ..\Guarantees + ..\Directories + ..\Alice + ..\Pros + ..\Graham T
            4⤵
            • System Location Discovery: System Language Discovery
            PID:684
          • C:\Users\Admin\AppData\Local\Temp\88473\Defensive.pif
            Defensive.pif T
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1792
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Electronics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Electronics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1524
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url" & echo URL="C:\Users\Admin\AppData\Local\DataSync Dynamics\MusesSync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MusesSync.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2976

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\datos\registros.dat

      Filesize

      184B

      MD5

      13997c579ad6a3800d77fa449a37c85f

      SHA1

      70fe1ac8d9ddbaeeefc273b10447a2a8f27994a8

      SHA256

      0fc788f63cc7cd7756fd164ad59b19eed50e64434c6524542b7c9cf3cd959cd9

      SHA512

      71b6229950d0dc4af41044a2dccfdc8c5934fd9a25e1a140232cd6cc0ed73a6e9bc3968d9b6e65b027333250aec1579434815089b44b382fc3f77bcf98f72757

    • C:\Users\Admin\AppData\Local\Temp\88473\T

      Filesize

      705KB

      MD5

      c07a747a9552773a0bdff8375d948b57

      SHA1

      228d0f5dbde64fc497174b1c176d4f0ec662b6a1

      SHA256

      00123d49066976c9216b71f21f3c95741aa07106b2dc466f019b88b260abcdca

      SHA512

      3b7e79c101b091a71773f92cddd8fc974f6b3126b6f3ae0a97960c3f4172cae8d0a5ecd5625710d23a2e20095113491d3de8bc28ccbec3f227c274f4effebab9

    • C:\Users\Admin\AppData\Local\Temp\Alice

      Filesize

      51KB

      MD5

      52843c2df6d700e0aba1d0df9f202fb9

      SHA1

      a27e94dfd46b2f549ad3cd7197412ea927dd7ec5

      SHA256

      4c647629a430738de5ea001349ae0bef7959d1092c15b817986e434511e861e5

      SHA512

      921e39e597a696752c8f05c3fc0d77d45b3112fe0d17423b2a38fbbb9679eb9e1ac57984d0fd29f83899f72fad709782411a753b14c881b72c1df2957bfe407a

    • C:\Users\Admin\AppData\Local\Temp\Bulgaria

      Filesize

      902KB

      MD5

      944015392b1ef8ea2364f1d913a8d367

      SHA1

      95316236e809a9359a706039204023bb2597f393

      SHA256

      7c0923d0ed5c9e3001a50af389917fb68668a7623d38f24d0b1971a8356b7cf5

      SHA512

      636900c5965a2cf9ad1b20015781291e6b2a6be6ad0e365b265d7bae169071cc3190996aa0c1ebf523a5df70c8de13294ca16152370455cd8708e4c6238fbfd4

    • C:\Users\Admin\AppData\Local\Temp\Classics

      Filesize

      18KB

      MD5

      6eee642c2a3a260e5b43d2a8fcc02aba

      SHA1

      5cfdf735055bfc8c277cf17fa093fb4d405cc13a

      SHA256

      861fdb83e5ed3364badbce2c7bfef06539b33b06322d5173ccacf7499af0277c

      SHA512

      a8fda3e8cc7abc9655dd78b1a77b9f01357020c1d8c16722c2aa7bc4dfda3281150c164944f5b1ec5dd351f2060ab99c307d8d7fa0068bd473cce8e6af2142ae

    • C:\Users\Admin\AppData\Local\Temp\Customize

      Filesize

      69KB

      MD5

      0a4dc3ca733d59e7496db826225b536e

      SHA1

      c32be7d49f3f3304d85bbbbc5b9f80569dc47b6b

      SHA256

      94b64a54b5ca33595336ab26e7f9ef202bad80dd032adbcab1cdd9a61fdb77f0

      SHA512

      b57588f88aa5c03fc9f9410ef1b48f2ed48b5348f2f4fb51e8fea140e510ddd5bcfc357174f6c4bfe5e263277717bb0e6f68f60c8693fc6e90616f5412b07046

    • C:\Users\Admin\AppData\Local\Temp\Damn

      Filesize

      86KB

      MD5

      64639f96913ff071951cab604e88e681

      SHA1

      9b6939623303d88974e05279bce0797a7931b58b

      SHA256

      d311891a25ee2b52b14475b774d42313965fc112b81fd3b85d9a38c9d9368b8c

      SHA512

      192acb4c34353baae70ba5681e0a1c7517ed0c36a52231a16478e3249e34ac9f064ada34c8ee3ce6f818330bf134867fb5c0a048745218702d783c266e62a63f

    • C:\Users\Admin\AppData\Local\Temp\Demo

      Filesize

      7KB

      MD5

      595a2fefa8bf265ad9f21ec518957c65

      SHA1

      a2f91c896bd2fadbb240aa1f72ae2543c5bc3444

      SHA256

      2b9d14702f75f3712a4224c45ae3356dfca5c6814b7963b45d3fd0153f82535a

      SHA512

      49f0af57f7665ad80a1bbac54bbc84a274fce94d0847181e1e19b348a0a09d5fd2147ac725395f4fc039ffa1c6c05a3b29140fab7950172b3afe6dc3eef75279

    • C:\Users\Admin\AppData\Local\Temp\Directories

      Filesize

      67KB

      MD5

      ac59c10a1ea58112f67d9199bceffcc6

      SHA1

      2bd97cd63741ae92ee14c58f2de8aef371345076

      SHA256

      7db329a128907cc4fae0136382e6565b4b93af333464a26b73a73ce14bb0afa4

      SHA512

      cd99a3b217ee6c752184d81b7cee377746e0cd7476bc5e300bbeaca1552d02cc8d07b802001332f465f4e2e32934c844e31660d9bc77d54ba6f76dcedfda51d4

    • C:\Users\Admin\AppData\Local\Temp\Downloadcom

      Filesize

      83KB

      MD5

      4866b5d6ac3d74c8eebc7c6ff7c26a03

      SHA1

      ce12149d7709fd0034413cd4c98d11e682734996

      SHA256

      d7cb3ed23589aa6d4dfcf7379d3fb72b338ab1b27c18a1a80851a4e8eb61b8b8

      SHA512

      6d1e85d8e200d35f597d0640c00c9a5fbed34e755eccbc78dce928c0b356a9eaeec16b8f40172408f539adf5dbf9dc542b1b48d5bbc9feb6edbe10f8dd26e6c8

    • C:\Users\Admin\AppData\Local\Temp\Graham

      Filesize

      62KB

      MD5

      8d5698baf31358d4a2093b7b8de7af12

      SHA1

      de9cf768ac00a6e3296a0f1e5a9f357d3a94abbf

      SHA256

      d074272cda941ae39748b778802a0077db27db94b36b6c1646b29a865485c921

      SHA512

      6fad82c67bfe5f7e6015fd1121ae56ef0baf0db237587cb5cf6e8b38c5fcd3ea045956840016df5d8d6cae26e2ca3d9cff3a68790929776c51baf012d916e345

    • C:\Users\Admin\AppData\Local\Temp\Guarantees

      Filesize

      74KB

      MD5

      ac78f4295147dd78728b3cd885994601

      SHA1

      02ad7e59305d597d2d124aadb0114a54d9e93131

      SHA256

      0068dd4901e587275a2f8212baecc921105727c2a7172f9c34fd374bf1d28aca

      SHA512

      a5e8c1bc1ddea9976c2e783c23f4b012fd4424226f79a09c5a85e5cf47834e54d4adf55c25bc1dc67295880546fa88cc205f2d97f87c3cfe4f7cd962f2b8f710

    • C:\Users\Admin\AppData\Local\Temp\Mat

      Filesize

      64KB

      MD5

      b9db27b33ba9766e06f74ba1f1cb6bf5

      SHA1

      cce86321f146261b8346f1b733a404fc0056bd42

      SHA256

      819ee9026d354cb095977ed0dbb712ef57defd58b7049479f2d510021fee2f72

      SHA512

      50ecfe14d5660c8e48963920678e41d0d7cd7059acd39221a3922b24164586bdb56c43fe263180beda6f568c4be7675d8228a4af7e3d0413e4a693a629203ee1

    • C:\Users\Admin\AppData\Local\Temp\Pros

      Filesize

      92KB

      MD5

      ebf80a135ff0e39e78e85797d890b97b

      SHA1

      9ed47495858f2b7c11f5fb0586f4f4209cddab85

      SHA256

      b99898ed2f34a33a84b235ce4b8c6c260814c3b3b547b38400f82bfe6c89262b

      SHA512

      6a1960cd692d9ea90c3de0964c592ad6d4a6b5597869f748174760feb69d73f51e2e19177083139e339acd961bd3b7c78eaa9fa871db6c519eb90e724a8d5869

    • C:\Users\Admin\AppData\Local\Temp\Stylus

      Filesize

      57KB

      MD5

      b8a70405aeb003272ebe394ef1eb4a7d

      SHA1

      edd8ec3d3fe6b6c99ac5c7e98ef260e1301fa54b

      SHA256

      c972fc290924db797196796c434f5a24ede99fdf80e551a5dc3a06e3975057ab

      SHA512

      129df6a35b6bcbbbedcbb34c422138bd0b1d989ccbbf32a0166930e382ea38123ee4c311f199e909c8bf884891c0bd8f817d89d3e587b35e2635588364bd4ceb

    • \Users\Admin\AppData\Local\Temp\88473\Defensive.pif

      Filesize

      921KB

      MD5

      78ba0653a340bac5ff152b21a83626cc

      SHA1

      b12da9cb5d024555405040e65ad89d16ae749502

      SHA256

      05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

      SHA512

      efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

    • memory/1792-219-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-217-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-221-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-222-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-220-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-223-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-226-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB

    • memory/1792-218-0x0000000003D90000-0x0000000003E0F000-memory.dmp

      Filesize

      508KB