Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 02:18

General

  • Target

    3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566.exe

  • Size

    897KB

  • MD5

    667060459d876845db2677ddc3d58488

  • SHA1

    800f741383f4f4027d70a5942fe4b263b592eed5

  • SHA256

    3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566

  • SHA512

    c9fce460c1b2de0e53782df4a84dc6c1d28bc4b8b8850b0adcbf3f87e72d156654760ebb32e52582a7adc4e3d58526959b51cdfd72fa947b314749c23492fee7

  • SSDEEP

    24576:vMy1GyhxutkS+BwTCEGh0BV0i7OqD4uTfV:LFhxutkdeCEGmB6uD4uD

Malware Config

Extracted

Family

remcos

Botnet

Host

C2

oyo.work.gd:3142

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    vlc

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    pdf

  • mouse_option

    false

  • mutex

    jkm-I9KENP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    ios

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566.exe
    "C:\Users\Admin\AppData\Local\Temp\3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566.exe
      "C:\Users\Admin\AppData\Local\Temp\3e080ccb41529931481861828df6a2ca32b039ed0217adcecb832547d8da0566.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pdf\logs.dat

    Filesize

    144B

    MD5

    c9f9c56db67c07eab071df1496a8062d

    SHA1

    941cd247307821a2a473cc321b6a995a47798c03

    SHA256

    65421125c0c2c8e4beb109fbec5cf47eba41f59390d670ae497fc6a53c006cdf

    SHA512

    9374e080524f410bb38eeece59b302054a5537d52808901f1431d906fb5bafaaf6fb11c36ea68e380cabf90c2c25abb45470d007607ae7d6af8ee72abfcc4f61

  • memory/1720-12-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-14-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-63-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-62-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-13-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-55-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-8-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-26-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-24-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-10-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-21-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-20-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-18-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1720-15-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-54-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-47-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-46-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-39-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-11-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-9-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-27-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-28-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-29-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-31-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1720-38-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2472-1-0x0000000000FE0000-0x00000000010C6000-memory.dmp

    Filesize

    920KB

  • memory/2472-25-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-2-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-5-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2472-0-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2472-6-0x0000000004D40000-0x0000000004E00000-memory.dmp

    Filesize

    768KB

  • memory/2472-4-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2472-3-0x00000000006E0000-0x00000000006F2000-memory.dmp

    Filesize

    72KB