Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/12/2024, 02:43 UTC

General

  • Target

    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe

  • Size

    760KB

  • MD5

    20d75709d275ee9fc5b559e50ae667c3

  • SHA1

    27b41abb5cf6a0492fbd44db949ed78629548ee6

  • SHA256

    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a

  • SHA512

    0987ce0ae8d3447034f76b11ab618b8b92f73d0e5ed50d2e5a0ba204f0a8cf830ed4795abbeebe72c035ecfa3e96391756cda8cb7f064f183cdb4554510be64f

  • SSDEEP

    12288:GtomEHbPc17d211S7nu/s6dSf/5vJ6UuWsz6MNwXLLKqKUGpjSvI0Z:TN7Pi7Iw1aSz6n16ewXLu9UKjSvI0Z

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

162.251.122.87:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-UOMZ21

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 8 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    "C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
      "C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
        C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe /stext "C:\Users\Admin\AppData\Local\Temp\huwqvferdp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1980
      • C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
        C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe /stext "C:\Users\Admin\AppData\Local\Temp\jwbbvyosryjtj"
        3⤵
        • Accesses Microsoft Outlook accounts
        • System Location Discovery: System Language Discovery
        PID:1640
      • C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
        C:\Users\Admin\AppData\Local\Temp\530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe /stext "C:\Users\Admin\AppData\Local\Temp\uqptwqzmegbyleqxb"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:580

Network

  • flag-us
    GET
    http://66.63.187.30/hpVMAPRZVuaX36.bin
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    Remote address:
    66.63.187.30:80
    Request
    GET /hpVMAPRZVuaX36.bin HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
    Host: 66.63.187.30
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Content-Type: application/octet-stream
    Last-Modified: Mon, 16 Dec 2024 11:12:34 GMT
    Accept-Ranges: bytes
    ETag: "5f233e68ab4fdb1:0"
    Server: Microsoft-IIS/10.0
    Date: Tue, 17 Dec 2024 02:44:05 GMT
    Content-Length: 493120
  • flag-us
    DNS
    geoplugin.net
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Tue, 17 Dec 2024 02:44:09 GMT
    server: Apache
    content-length: 956
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • 66.63.187.30:80
    http://66.63.187.30/hpVMAPRZVuaX36.bin
    http
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    9.0kB
    508.0kB
    192
    366

    HTTP Request

    GET http://66.63.187.30/hpVMAPRZVuaX36.bin

    HTTP Response

    200
  • 162.251.122.87:2404
    tls
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    3.4kB
    1.6kB
    12
    15
  • 162.251.122.87:2404
    tls
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    30.7kB
    512.3kB
    218
    383
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    583 B
    2.5kB
    11
    4

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    geoplugin.net
    dns
    530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    e8b0b3d108ecbbc5a6d37177adc23f23

    SHA1

    73c41352cd902149963b50ae62b76e1b82eb9ef7

    SHA256

    babd5fb3c89a5f05a3b38ae88869056bcd7224cdddb834519e3732dadb9b2e42

    SHA512

    ec0f1891234fa05fe6681d7a846259f0ab51c3aca5b2e14aafb73c8669d48ac5b065d7f9391420ba3207210072f0fe4f90a92e44c0c1985598bef96c19dafbdd

  • C:\Users\Admin\AppData\Local\Temp\huwqvferdp

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Local\Temp\nsjF166.tmp

    Filesize

    60B

    MD5

    7ed75a71351bfc4eaabfc06754e83a71

    SHA1

    b588df2f060e1356e9950344d31dc8b566ea5e43

    SHA256

    2d45fd2175ad61122ca69dc5fb613b7cfc525c489f08942b81c9f7546ab303c6

    SHA512

    2e92b886fb3149912a627bdccada189179aa7e04600177def15270b7346e0da45db52ddaa75e9e6d40458c8d0bba870cfceda39c160865060d4f11f11b9f6a6f

  • C:\Users\Admin\AppData\Local\Temp\nsoF136.tmp

    Filesize

    52B

    MD5

    5d04a35d3950677049c7a0cf17e37125

    SHA1

    cafdd49a953864f83d387774b39b2657a253470f

    SHA256

    a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266

    SHA512

    c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

  • C:\Users\Admin\AppData\Local\Temp\nsoF445.tmp

    Filesize

    30B

    MD5

    f15bfdebb2df02d02c8491bde1b4e9bd

    SHA1

    93bd46f57c3316c27cad2605ddf81d6c0bde9301

    SHA256

    c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043

    SHA512

    1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

  • C:\Users\Admin\AppData\Local\Temp\nstEF31.tmp

    Filesize

    74B

    MD5

    16d513397f3c1f8334e8f3e4fc49828f

    SHA1

    4ee15afca81ca6a13af4e38240099b730d6931f0

    SHA256

    d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36

    SHA512

    4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

  • C:\Users\Admin\AppData\Local\Temp\nstEF31.tmp

    Filesize

    21B

    MD5

    8971b7a691c3fa70cb038019ee564845

    SHA1

    bdffd99c78750e7832d7d1e0cdee6c08c089ecb5

    SHA256

    612365d1000c11e69ee5ecd1faa7dc59078993959c48b7916a580b7bd3cbf587

    SHA512

    ee51ddd485220a130dbd4ae28f47f7bb990ca989deaabd5467b2f446cba05b2e600e1c04414e844c94bdc0b68bdfc2618e8aa410401cbb640c59831b8f9647d9

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    1B

    MD5

    8ce4b16b22b58894aa86c421e8759df3

    SHA1

    13fbd79c3d390e5d6585a21e11ff5ec1970cff0c

    SHA256

    8254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a

    SHA512

    2af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    2B

    MD5

    25bc6654798eb508fa0b6343212a74fe

    SHA1

    15d5e1d3b948fd5986aaff7d9419b5e52c75fc93

    SHA256

    8e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc

    SHA512

    5868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    3B

    MD5

    4e27f2226785e9abbe046fc592668860

    SHA1

    28b18a7f383131df509f7191f946a32c5a2e410c

    SHA256

    01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d

    SHA512

    2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    4B

    MD5

    cde63b34c142af0a38cbe83791c964f8

    SHA1

    ece2b194b486118b40ad12c1f0e9425dd0672424

    SHA256

    65e2d70166c9a802b7ad2a87129b8945f083e5f268878790a9d1f1c03f47938d

    SHA512

    0559d3d34ad64ccc27e685431c24fc6ead0f645db14fa0e125a64fb67dbd158c15432c1fc5407811aac8a3486090dfbcfcbc3c6bf5aa0ec73f979ef62d14853c

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    5B

    MD5

    e2fecc970546c3418917879fe354826c

    SHA1

    63f1c1dd01b87704a6b6c99fd9f141e0a3064f16

    SHA256

    ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0

    SHA512

    3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    6B

    MD5

    50484c19f1afdaf3841a0d821ed393d2

    SHA1

    c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b

    SHA256

    6923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c

    SHA512

    d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    7B

    MD5

    67cfa7364c4cf265b047d87ff2e673ae

    SHA1

    56e27889277981a9b63fcf5b218744a125bbc2fa

    SHA256

    639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713

    SHA512

    17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

  • C:\Users\Admin\AppData\Local\Temp\nsyF176.tmp

    Filesize

    8B

    MD5

    c3cb69218b85c3260387fb582cb518dd

    SHA1

    961c892ded09a4cbb5392097bb845ccba65902ad

    SHA256

    1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101

    SHA512

    2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

  • \Users\Admin\AppData\Local\Temp\nsjF116.tmp\System.dll

    Filesize

    11KB

    MD5

    ca332bb753b0775d5e806e236ddcec55

    SHA1

    f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

    SHA256

    df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

    SHA512

    2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

  • memory/580-604-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/580-594-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/580-601-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/580-600-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1640-615-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1640-596-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1640-587-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1640-591-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1640-593-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1640-599-0x0000000077B10000-0x0000000077CB9000-memory.dmp

    Filesize

    1.7MB

  • memory/1980-597-0x0000000077B10000-0x0000000077CB9000-memory.dmp

    Filesize

    1.7MB

  • memory/1980-609-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1980-586-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1980-592-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1980-589-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1980-595-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2456-621-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-636-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-579-0x0000000077B10000-0x0000000077CB9000-memory.dmp

    Filesize

    1.7MB

  • memory/2456-654-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-616-0x0000000036C50000-0x0000000036C69000-memory.dmp

    Filesize

    100KB

  • memory/2456-620-0x0000000036C50000-0x0000000036C69000-memory.dmp

    Filesize

    100KB

  • memory/2456-619-0x0000000036C50000-0x0000000036C69000-memory.dmp

    Filesize

    100KB

  • memory/2456-584-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-624-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-651-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-627-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-630-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-633-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-580-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-639-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-642-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-645-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2456-648-0x0000000000480000-0x00000000014E2000-memory.dmp

    Filesize

    16.4MB

  • memory/2664-577-0x0000000077B11000-0x0000000077C12000-memory.dmp

    Filesize

    1.0MB

  • memory/2664-578-0x0000000077B10000-0x0000000077CB9000-memory.dmp

    Filesize

    1.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.