Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
PaymentTransferRequestForm.bat.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PaymentTransferRequestForm.bat.exe
Resource
win10v2004-20241007-en
General
-
Target
PaymentTransferRequestForm.bat.exe
-
Size
1.2MB
-
MD5
fc5a80adf45d78ffa834283d0a78f9f6
-
SHA1
6865dec6f71546ea01420295b7175038c3a81ec4
-
SHA256
e588a098e9ceb33f2616e11a3faf28162e5f4b7f3800b22ab3023bc376aeb18c
-
SHA512
27636cd0d31e3b1ff384869f1f2be6c23d7f02ecd70027c5d689de0893835d070218596a941472481d637cc6253ed3f2405991a6af4772596cc88f909a7dd7cb
-
SSDEEP
24576:RYdgfvzAKzxWCC9vSA6GRdsttHVqowvVpBdlvlOUa:rzAcWFt96ydyQow5dldna
Malware Config
Extracted
remcos
RemoteHost
212.162.149.226:9285
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
AppUpdate
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-VCJ8ZS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
AppUpdate
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2972 powershell.exe 2808 powershell.exe 1280 powershell.exe 2560 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
remcos.exeremcos.exepid process 2940 remcos.exe 1800 remcos.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 536 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
PaymentTransferRequestForm.bat.exeremcos.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\AppUpdate = "\"C:\\ProgramData\\AppUpdate\\remcos.exe\"" PaymentTransferRequestForm.bat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AppUpdate = "\"C:\\ProgramData\\AppUpdate\\remcos.exe\"" PaymentTransferRequestForm.bat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\AppUpdate = "\"C:\\ProgramData\\AppUpdate\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AppUpdate = "\"C:\\ProgramData\\AppUpdate\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
PaymentTransferRequestForm.bat.exeremcos.exedescription pid process target process PID 2684 set thread context of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2940 set thread context of 1800 2940 remcos.exe remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PaymentTransferRequestForm.bat.exeschtasks.exeWScript.execmd.exeremcos.exeschtasks.exeremcos.exepowershell.exepowershell.exePaymentTransferRequestForm.bat.exepowershell.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaymentTransferRequestForm.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaymentTransferRequestForm.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2816 schtasks.exe 2480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
PaymentTransferRequestForm.bat.exepowershell.exepowershell.exeremcos.exepowershell.exepowershell.exepid process 2684 PaymentTransferRequestForm.bat.exe 2684 PaymentTransferRequestForm.bat.exe 2684 PaymentTransferRequestForm.bat.exe 2684 PaymentTransferRequestForm.bat.exe 2808 powershell.exe 2972 powershell.exe 2940 remcos.exe 2940 remcos.exe 2940 remcos.exe 1280 powershell.exe 2560 powershell.exe 2940 remcos.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
PaymentTransferRequestForm.bat.exepowershell.exepowershell.exeremcos.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2684 PaymentTransferRequestForm.bat.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeDebugPrivilege 2940 remcos.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
PaymentTransferRequestForm.bat.exePaymentTransferRequestForm.bat.exeWScript.execmd.exeremcos.exedescription pid process target process PID 2684 wrote to memory of 2972 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2972 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2972 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2972 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2808 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2808 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2808 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2808 2684 PaymentTransferRequestForm.bat.exe powershell.exe PID 2684 wrote to memory of 2816 2684 PaymentTransferRequestForm.bat.exe schtasks.exe PID 2684 wrote to memory of 2816 2684 PaymentTransferRequestForm.bat.exe schtasks.exe PID 2684 wrote to memory of 2816 2684 PaymentTransferRequestForm.bat.exe schtasks.exe PID 2684 wrote to memory of 2816 2684 PaymentTransferRequestForm.bat.exe schtasks.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2684 wrote to memory of 2652 2684 PaymentTransferRequestForm.bat.exe PaymentTransferRequestForm.bat.exe PID 2652 wrote to memory of 1608 2652 PaymentTransferRequestForm.bat.exe WScript.exe PID 2652 wrote to memory of 1608 2652 PaymentTransferRequestForm.bat.exe WScript.exe PID 2652 wrote to memory of 1608 2652 PaymentTransferRequestForm.bat.exe WScript.exe PID 2652 wrote to memory of 1608 2652 PaymentTransferRequestForm.bat.exe WScript.exe PID 1608 wrote to memory of 536 1608 WScript.exe cmd.exe PID 1608 wrote to memory of 536 1608 WScript.exe cmd.exe PID 1608 wrote to memory of 536 1608 WScript.exe cmd.exe PID 1608 wrote to memory of 536 1608 WScript.exe cmd.exe PID 536 wrote to memory of 2940 536 cmd.exe remcos.exe PID 536 wrote to memory of 2940 536 cmd.exe remcos.exe PID 536 wrote to memory of 2940 536 cmd.exe remcos.exe PID 536 wrote to memory of 2940 536 cmd.exe remcos.exe PID 2940 wrote to memory of 1280 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 1280 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 1280 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 1280 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 2560 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 2560 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 2560 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 2560 2940 remcos.exe powershell.exe PID 2940 wrote to memory of 2480 2940 remcos.exe schtasks.exe PID 2940 wrote to memory of 2480 2940 remcos.exe schtasks.exe PID 2940 wrote to memory of 2480 2940 remcos.exe schtasks.exe PID 2940 wrote to memory of 2480 2940 remcos.exe schtasks.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe PID 2940 wrote to memory of 1800 2940 remcos.exe remcos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PaymentTransferRequestForm.bat.exe"C:\Users\Admin\AppData\Local\Temp\PaymentTransferRequestForm.bat.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PaymentTransferRequestForm.bat.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iKgKaogJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iKgKaogJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA4D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\PaymentTransferRequestForm.bat.exe"C:\Users\Admin\AppData\Local\Temp\PaymentTransferRequestForm.bat.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\AppUpdate\remcos.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\ProgramData\AppUpdate\remcos.exeC:\ProgramData\AppUpdate\remcos.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\AppUpdate\remcos.exe"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iKgKaogJ.exe"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iKgKaogJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72B0.tmp"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2480
-
-
C:\ProgramData\AppUpdate\remcos.exe"C:\ProgramData\AppUpdate\remcos.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fc5a80adf45d78ffa834283d0a78f9f6
SHA16865dec6f71546ea01420295b7175038c3a81ec4
SHA256e588a098e9ceb33f2616e11a3faf28162e5f4b7f3800b22ab3023bc376aeb18c
SHA51227636cd0d31e3b1ff384869f1f2be6c23d7f02ecd70027c5d689de0893835d070218596a941472481d637cc6253ed3f2405991a6af4772596cc88f909a7dd7cb
-
Filesize
392B
MD5046708368578d720d91fb9ceecec742e
SHA11dc732f67f48a1d5694f4cf14a8d279dbd1d6ee6
SHA25604f4edc28e97a16f93cf7acac864aba17cc467282550ae61baac719262be6f5e
SHA5129106f645ee74c9e061fcb396a00d706512d41054a356125f26a10d42390d8f0d3ea3dd785393bf5de358b62464ec3c0f7d2e27411e87bb408581f820c427e7f0
-
Filesize
1KB
MD5416453ad088ce861d0c1be11604eaffb
SHA115ab130f07135342295aed87b279a53b13690889
SHA25610b560c9c272a31fa31b387bb88f7a0b1b656db3927d1730cde370c9893c6db6
SHA512cf2f6f178b4c5fa3847ce42f0c020e5123749909302330244a60a85e6f51d4e0d7d445482a2bd332c06a6cd0b252722f0b0e93fe72f9b43f642b1e0e8d4af7aa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57bcb78d120aaee4a449cc6e89d16ef39
SHA17ea1b88e24d7bd51ccab6c61bdedc6a25a46f95c
SHA256a6b6cab038147b649ce56759a9e4adad4acd880f4b7ba391aacb6e384c537d15
SHA5122cbb7df4e51f4c6ec5502941d526a7109044530f5e475dd76a22d551f3c12179a42a8f3b4605c41c831e8f97f540f410b2e65e43025890d60332c6668e2e5c9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c5c821782f44a495808f87387f9e56ae
SHA1d10bb9d036134ff9f5ac104fe29d10827b4f6350
SHA25678d57d9870c7b1c7ade3ef6e09b38896b84a7640c2ef4168102eef253fd34419
SHA51260034ff6695e275eca95b57bc6a5a9bb142dbee7204a134a47484205ccfe6e1ba8f1de9f06af66bb01d554abdd632322a509ec3025fa67d852a71b2e2428d9a7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e