Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 15:17

General

  • Target

    Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe

  • Size

    789KB

  • MD5

    92e917f439cc408828a0629d80fdb043

  • SHA1

    ffcf08807371521fb40a31aff774e3275cd4338d

  • SHA256

    6959fb446ee0634e6622e50f0f1b9367bffddf12f8083507cdc0ff39ed50abf4

  • SHA512

    c78fa619b27defc8a458a841b7fa20fe84e738e2d13203d0c8f454adb83555da99c574105bc36d4aeb765ee0cb67d158a1828fb2f88a92d1f6dcc51c7dfd5f9a

  • SSDEEP

    12288:GtomEHbPcEFdCSdWdQqOFvvcW/5W4MiTFroRnk9YZaax8NNAta67Qi5vz8s+u+K+:TN7PcKd66MWjBroRbkOQ/t

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

162.251.122.87:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UOMZ21

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 8 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe
    "C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe
      "C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe
        "C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe" /stext "C:\Users\Admin\AppData\Local\Temp\mssu"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2320
      • C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe
        "C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuyfikhp"
        3⤵
        • Accesses Microsoft Outlook accounts
        • System Location Discovery: System Language Discovery
        PID:1532
      • C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe
        "C:\Users\Admin\AppData\Local\Temp\Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe" /stext "C:\Users\Admin\AppData\Local\Temp\zpdxjcsipfa"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    789a5b2694430ce6590672c7c86d5c0a

    SHA1

    2b41f0905dd666a35a6315709112864155d459df

    SHA256

    84ceb73ba99279f64b6d1419cc187898da212fb752ff6e5e23501ecd8c4c6328

    SHA512

    a446add776161f289b6ad7f13a4a097040df90bdf8db1c19852be82a629d7e5807817e8890a66e10c66ef22269a28b99d442f8affef23beede12d257de5717e6

  • C:\Users\Admin\AppData\Local\Temp\mssu

    Filesize

    4KB

    MD5

    60a0bdc1cf495566ff810105d728af4a

    SHA1

    243403c535f37a1f3d5f307fc3fb8bdd5cbcf6e6

    SHA256

    fd12da9f9b031f9fa742fa73bbb2c9265f84f49069b7c503e512427b93bce6d2

    SHA512

    4445f214dbf5a01d703f22a848b56866f3f37b399de503f99d40448dc86459bf49d1fa487231f23c080a559017d72bcd9f6c13562e1f0bd53c1c9a89e73306a5

  • C:\Users\Admin\AppData\Local\Temp\nsi8F23.tmp\System.dll

    Filesize

    11KB

    MD5

    ca332bb753b0775d5e806e236ddcec55

    SHA1

    f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

    SHA256

    df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

    SHA512

    2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

  • C:\Users\Admin\AppData\Local\Temp\nsi8F24.tmp

    Filesize

    9B

    MD5

    2b3884fe02299c565e1c37ee7ef99293

    SHA1

    d8e2ef2a52083f6df210109fea53860ea227af9c

    SHA256

    ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858

    SHA512

    aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

  • C:\Users\Admin\AppData\Local\Temp\nsi8F24.tmp

    Filesize

    24B

    MD5

    60f65c2cd21dde8cc4ce815633d832e0

    SHA1

    c1196320458557d8c4f65ba6810953b1037a822b

    SHA256

    7f0f042b1879b1b8f04a5e6051e577a1e691ec322789c4d98d52494cfd906ce7

    SHA512

    301ead9a6620deccb0be51bbe4eb760ca9d48d029cded0c6cdc7115a4353f4d9330f2ca92df2519a78a7d5aa24975ca6fa19c0269cc411026739b3f733f8d8f2

  • C:\Users\Admin\AppData\Local\Temp\nsi8F24.tmp

    Filesize

    36B

    MD5

    3d4b43e24f8a5cb80bba86e69735e146

    SHA1

    caaa79191da01e6cdd282f084dd7299c54a57dfe

    SHA256

    54f4b8891dda2b1f31a6b798b8ef5e253f79173727341309c86f50191584a3eb

    SHA512

    6d34fba9a130aaff8dba31f64f7f0c4168134092428661adf9906826e39d497754927a479dcfe0809101b6da0a1d7c08cbb53ccc74c371edbf01c054c7bce4a2

  • C:\Users\Admin\AppData\Local\Temp\nsi8F24.tmp

    Filesize

    40B

    MD5

    288ddaeead52cc6f01034b0ca08e313d

    SHA1

    849306d8ccc2366251d6dbb07ba2447f800b121e

    SHA256

    5a3785d2999bdf1992068d247a71a7acc4946c13f17c880635dfa9e48fd2eb2e

    SHA512

    6101434e23c1bb35be4691de56dca636e4dd713d6ec9f1815b450af666b858b29a96bdae786be376dc312043ab19a3a88789816bf0023e363a703c551645d650

  • C:\Users\Admin\AppData\Local\Temp\nsi8F24.tmp

    Filesize

    52B

    MD5

    5d04a35d3950677049c7a0cf17e37125

    SHA1

    cafdd49a953864f83d387774b39b2657a253470f

    SHA256

    a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266

    SHA512

    c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    8B

    MD5

    c3cb69218b85c3260387fb582cb518dd

    SHA1

    961c892ded09a4cbb5392097bb845ccba65902ad

    SHA256

    1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101

    SHA512

    2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    32B

    MD5

    bb7e44a9ab155210ab3d7a707c164476

    SHA1

    34cc96f86d6a1ee7fbf049b9e64dbc5bbf333102

    SHA256

    e92875a6d392be46dc5154fa117aa328d9fc000a782ce97ccc1a7677d098e29f

    SHA512

    fc5a6eea30fa54fa0cdd09998c03f43ee3b7218f631da61fe84aa8de226c8a9c98fdca6f089c4d3777dd858dd7115f1582877dadfb1a8caba5196d5f20dda7c0

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    34B

    MD5

    94e9e62262609488f33753426e32d435

    SHA1

    562c971934fb81a7cbd690dfa6d3b7fcb463bf65

    SHA256

    7e7b96b7d22dec362c878c10b4d51887ad92aa210fe646e8667de5da82f1e47b

    SHA512

    5bcb92fefe3f86064ccdbd809fc308cf18e18d47f729a29a8f62b7c2bb9d42fa0376ad72baa1f24131edb6ebbed9284377618e317cbdf9cc88c09fd3a9e3eb38

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    40B

    MD5

    132233b9e11f90e500762a52a793a875

    SHA1

    fd5599c8b694cc97ad8d537c6835f214fd27788a

    SHA256

    fdd905fcc72acfb953ff1a8a514efa2df13e9d181db7962ebd9ef4a325e2aef5

    SHA512

    26ebdfdddead6b3d197b25af1fb93bd2c9d42d96a7ae18c16870f7aca5cc5237bdef9cc8cb90ad3c0a264279152b0a4a3611cc8f09b207b5c8dadf6d0b099f13

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    55B

    MD5

    442af9e3cdf3065c44bba4ebc29729a0

    SHA1

    7bb07055091eaaaaf7e6b4fc9b70adb42337c33e

    SHA256

    64bd20404625bf73c0bcb13bbc8180c9f573d0583c94105c07505ad44f4eec13

    SHA512

    06dd9fe340f84d1a2e527c8dc81b7a78c6b8d9e70b8dee63a27d87698be153b87c49993706ae246f643d47d3667c1678b0cb7f6181ecc39d88e34b309daa5f10

  • C:\Users\Admin\AppData\Local\Temp\nsj8F74.tmp

    Filesize

    60B

    MD5

    df8379d971f8775d91cd01506f558897

    SHA1

    e28ff2839b7cf171ce3540cb2de64fa18db9b12c

    SHA256

    ae63da186497c9240a3af76e8e52198426c3492aa7dcc62e8910405ef981ecec

    SHA512

    ac091f635bc253fed0c5c9e516f4e58968033793c66b2ec3e5ed31aa42d63667d85f1661ca6fbe8cfc28ad59b07d903556987c7f79aa59610934c3d6f6f60f02

  • C:\Users\Admin\AppData\Local\Temp\nsj8FC3.tmp

    Filesize

    56B

    MD5

    4ff83567cd3f682cb62e957f312f61a0

    SHA1

    5bb6b4b35e74fb335211813b25025166939ddf10

    SHA256

    9a2382a1ededef09ef70d6dfcea50be1594799e518a9f89c111875301539a2ae

    SHA512

    e7fbb21a2eaee93f4f607b77476c8605a7233cb16c0ef576fac05235252c5a0dab338277749a9a38babf9163d9d582d481e2a739ebbb578bfb3b813fc36a678e

  • C:\Users\Admin\AppData\Local\Temp\nsj8FC3.tmp

    Filesize

    52B

    MD5

    d52de89f9a53448452938d5bef6370af

    SHA1

    0a5e19717c5f25862231235165135923d3a3f6af

    SHA256

    8f38876522a41713735c750b50769955e309c3d608811003b6d16ca5f4b80282

    SHA512

    568e7cdea808709be892eacc59033688c4f7352a395aefbfc618519142136538c6220ca00b10abfc44e34e9d635dd72c5b51eefae2ab2a873149523c425f51f9

  • C:\Users\Admin\AppData\Local\Temp\nst8EC5.tmp

    Filesize

    74B

    MD5

    16d513397f3c1f8334e8f3e4fc49828f

    SHA1

    4ee15afca81ca6a13af4e38240099b730d6931f0

    SHA256

    d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36

    SHA512

    4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

  • C:\Users\Admin\AppData\Local\Temp\nst8EC5.tmp

    Filesize

    6B

    MD5

    50484c19f1afdaf3841a0d821ed393d2

    SHA1

    c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b

    SHA256

    6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c

    SHA512

    d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

  • C:\Users\Admin\AppData\Local\Temp\nst8EC5.tmp

    Filesize

    41B

    MD5

    9b63af13344f6ef82f01f463737f3a43

    SHA1

    8d8b471641cae2462b39fa096c26475167bbf274

    SHA256

    8b0454c42dded71d9ee62354260d89e0565bb803a300bb2c49c9dd50fd2d1c4b

    SHA512

    708585072fc9f56b68a2737726b580347861fc188d60b19e59d9b6b4a9fcd25e39a972254146f97d4aee32fc9502546c5da2803b027222f70de6d223e93db674

  • C:\Users\Admin\AppData\Local\Temp\nst8EC5.tmp

    Filesize

    55B

    MD5

    2598d3e10bec5798f73f49de505a8514

    SHA1

    4431b20a112e277250649a917f846a6627870a60

    SHA256

    08643cfe1a514214ae4175809b7eadbc0bff209e07adf091e91748dccf9ca874

    SHA512

    83687d6fb3238184b92f04cc70e54ede282d56e34f67781db6c4dfd9529cab30ba15d9ca3059b68f9d82eb87a8d6432e80ba0779d1438c1df861b0bb30905f24

  • C:\Users\Admin\AppData\Local\Temp\nsy9021.tmp

    Filesize

    30B

    MD5

    f15bfdebb2df02d02c8491bde1b4e9bd

    SHA1

    93bd46f57c3316c27cad2605ddf81d6c0bde9301

    SHA256

    c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043

    SHA512

    1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

  • memory/1532-599-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1532-596-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1532-601-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1532-604-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2028-605-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2028-607-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2028-614-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2028-612-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2028-611-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2320-600-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2320-606-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2320-595-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2320-617-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2320-602-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3560-575-0x0000000004A10000-0x00000000055EF000-memory.dmp

    Filesize

    11.9MB

  • memory/3560-576-0x0000000077791000-0x00000000778B1000-memory.dmp

    Filesize

    1.1MB

  • memory/3560-577-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB

  • memory/3560-578-0x0000000004A10000-0x00000000055EF000-memory.dmp

    Filesize

    11.9MB

  • memory/4608-620-0x00000000332A0000-0x00000000332B9000-memory.dmp

    Filesize

    100KB

  • memory/4608-589-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-580-0x0000000077791000-0x00000000778B1000-memory.dmp

    Filesize

    1.1MB

  • memory/4608-579-0x00000000016E0000-0x00000000022BF000-memory.dmp

    Filesize

    11.9MB

  • memory/4608-582-0x0000000077835000-0x0000000077836000-memory.dmp

    Filesize

    4KB

  • memory/4608-583-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-588-0x0000000077791000-0x00000000778B1000-memory.dmp

    Filesize

    1.1MB

  • memory/4608-587-0x00000000016E0000-0x00000000022BF000-memory.dmp

    Filesize

    11.9MB

  • memory/4608-590-0x0000000077791000-0x00000000778B1000-memory.dmp

    Filesize

    1.1MB

  • memory/4608-624-0x00000000332A0000-0x00000000332B9000-memory.dmp

    Filesize

    100KB

  • memory/4608-623-0x00000000332A0000-0x00000000332B9000-memory.dmp

    Filesize

    100KB

  • memory/4608-581-0x0000000077818000-0x0000000077819000-memory.dmp

    Filesize

    4KB

  • memory/4608-627-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-594-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-630-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-633-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-636-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-639-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-642-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-645-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-647-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-650-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-653-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4608-657-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB