Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
Resource
win10v2004-20241007-en
General
-
Target
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe
-
Size
1.3MB
-
MD5
358ec1b6439850f0bb6ccad7131cf347
-
SHA1
a8e6f81f044051e6cdc829e99a31be3d6a7d6779
-
SHA256
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629
-
SHA512
5d95aed5645d975f243bda9d1fe624f8b83ee4255974eb6bc2db78cc42e80d97b4056f959fcbe2cfeb59a7db40ecd4a8ca35c8c4e141494546b850eacc72e799
-
SSDEEP
24576:rAOcZEhGZJLnKjCT+8RrtqrpUu8sR0coTvAiHca6TPY5I7nT1RMwa+NI:tMZU/SrtqrpccOv/HP6c5IzTXM7+NI
Malware Config
Extracted
remcos
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bmxbniuglo.pif5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation bmxbniuglo.pif Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe -
Executes dropped EXE 2 IoCs
Processes:
bmxbniuglo.pifRegSvcs.exepid process 3136 bmxbniuglo.pif 4404 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bmxbniuglo.pifdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\45235440\\BMXBNI~1.PIF c:\\45235440\\JIFVHS~1.TCL" bmxbniuglo.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bmxbniuglo.pifdescription pid process target process PID 3136 set thread context of 4404 3136 bmxbniuglo.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exemshta.exemshta.exemshta.exemshta.exemshta.exebmxbniuglo.pifmshta.exemshta.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmxbniuglo.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
bmxbniuglo.pifpid process 3136 bmxbniuglo.pif 3136 bmxbniuglo.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 4404 RegSvcs.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exebmxbniuglo.pifdescription pid process target process PID 1916 wrote to memory of 3136 1916 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 1916 wrote to memory of 3136 1916 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 1916 wrote to memory of 3136 1916 5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe bmxbniuglo.pif PID 3136 wrote to memory of 220 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 220 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 220 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4904 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4904 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4904 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 2860 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 2860 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 2860 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 3432 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 3432 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 3432 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4832 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4832 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4832 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1680 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1680 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1680 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1316 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1316 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 1316 3136 bmxbniuglo.pif mshta.exe PID 3136 wrote to memory of 4404 3136 bmxbniuglo.pif RegSvcs.exe PID 3136 wrote to memory of 4404 3136 bmxbniuglo.pif RegSvcs.exe PID 3136 wrote to memory of 4404 3136 bmxbniuglo.pif RegSvcs.exe PID 3136 wrote to memory of 4404 3136 bmxbniuglo.pif RegSvcs.exe PID 3136 wrote to memory of 4404 3136 bmxbniuglo.pif RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe"C:\Users\Admin\AppData\Local\Temp\5073eadffdcbba2f5bd8a67828f812a7272541295de57a5e61d8b75b25122629.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\45235440\bmxbniuglo.pif"C:\45235440\bmxbniuglo.pif" jifvhstup.tcl2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD58e699954f6b5d64683412cc560938507
SHA18ca6708b0f158eacce3ac28b23c23ed42c168c29
SHA256c9a2399cc1ce6f71db9da2f16e6c025bf6cb0f4345b427f21449cf927d627a40
SHA51213035106149c8d336189b4a6bdaf25e10ac0b027baea963b3ec66a815a572426b2e9485258447cf1362802a0f03a2aa257b276057590663161d9d55d5b737b02
-
Filesize
56KB
MD58b670b655cf5bdbec4e8bf031a5c303a
SHA1446d41c4e7a03d7e21261b52bc42a499e78697e8
SHA25658ffca8fbe9fe189e29909b12d8306af25dcea9b98af76167905d3f7d27555f1
SHA512d95918f4a5fd2649298b1218d4e62e8339d59eda01a47708c2934bbec6d7f0e16f68a8abc27c178dfe117c73a4e36083d1ca58e106900bde945179b1440fcffc
-
Filesize
919KB
MD503371574057f34d8f0cd8b857234477e
SHA1fabea7c051eb26d402e42be3279c24b51243172e
SHA2561093ea8b90ac829a7ca7058f5e7aafb74012a331090e52c3f2e7229a70895f08
SHA51282b25daf3662746f1d009c2ee2bc1f01715389d5545d883f3c795a8557d5796711f49840fbb5728081fd22203e961a82225f70a75ee7c2d29d1664c68f0f6f54
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
148B
MD51a72d3be86746d5ba81bdf6cf4b4f097
SHA1a36354d1eed4bc5d285722ba2bb3508a9625c27e
SHA2568e3c7839b0ad5724b470584a971a00b27ef6624974ffe1a92b2c8070cb297ae1
SHA512bdd933cac30833dd164fad19aceb823fce1177f561ed28999edce62811721b44fcf789fd3d3c52fab94749c1445cfdc986d55f19e0e62a9f3c6f4b48b71f8f76