Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe
Resource
win10v2004-20241007-en
General
-
Target
029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe
-
Size
293KB
-
MD5
15d69c839a4f4336de4b78c53adaa500
-
SHA1
829c2f6d3b9be98802ebb5e95a7fc2f87d33d210
-
SHA256
029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049
-
SHA512
e2e60b7c622c6f738a38437aa73df0c50fe2ac50389c4d564e947402385f5e06bcc4b60588ac17c4cae4b7e536061cc292b457bde832c8b1555eea1cfcb36dc0
-
SSDEEP
6144:f5ZdP3uQMi7StiABLHGEEUqdGrxrL0Or1jQQdy02sbY7:fdP3d2uO0Or1WkbY7
Malware Config
Extracted
remcos
2.1.0 Pro
Planes
remfff.duckdns.org:48604
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
csrss.exe
-
copy_folder
csrss.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
RemcosXs-L20P2E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
csrss.exe
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2752 csrss.exe 2548 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 cmd.exe 2664 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\\csrss.exe\"" 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe 2752 csrss.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 2752 csrss.exe 2752 csrss.exe 2548 csrss.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2120 wrote to memory of 2716 2120 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 32 PID 2716 wrote to memory of 2776 2716 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 33 PID 2716 wrote to memory of 2776 2716 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 33 PID 2716 wrote to memory of 2776 2716 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 33 PID 2716 wrote to memory of 2776 2716 029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe 33 PID 2776 wrote to memory of 2664 2776 WScript.exe 34 PID 2776 wrote to memory of 2664 2776 WScript.exe 34 PID 2776 wrote to memory of 2664 2776 WScript.exe 34 PID 2776 wrote to memory of 2664 2776 WScript.exe 34 PID 2664 wrote to memory of 2752 2664 cmd.exe 36 PID 2664 wrote to memory of 2752 2664 cmd.exe 36 PID 2664 wrote to memory of 2752 2664 cmd.exe 36 PID 2664 wrote to memory of 2752 2664 cmd.exe 36 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37 PID 2752 wrote to memory of 2548 2752 csrss.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe"C:\Users\Admin\AppData\Local\Temp\029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe"C:\Users\Admin\AppData\Local\Temp\029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049N.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422B
MD5f3ed21a8dbf48ccf6487d68cd12b8e89
SHA137b725cdc3bb8b91cb6242529721a2c3f1f03af2
SHA256a2c8cc5a927929bb186c39f2deefa5ca869ab705ada7b13c2687a54c99df0416
SHA512da85bc3517b3d085a29ae9c1a200ca7ae6c46f6bff4d5dc199bf493e6eda9cd223acf3945a4e24ae24f5a7fbc134f0345d725a6af1061b6c3f526ffec599851f
-
Filesize
293KB
MD515d69c839a4f4336de4b78c53adaa500
SHA1829c2f6d3b9be98802ebb5e95a7fc2f87d33d210
SHA256029783fcf4e6f9e78a2db3e8d9caa398f8bfa5cc857c69eabdeb67e66e637049
SHA512e2e60b7c622c6f738a38437aa73df0c50fe2ac50389c4d564e947402385f5e06bcc4b60588ac17c4cae4b7e536061cc292b457bde832c8b1555eea1cfcb36dc0
-
Filesize
79B
MD56534f458f8d22de9544e9c855fc4a5c1
SHA1ac503fb585096a72d90a6b68cc94a2743ea9ecd1
SHA2568921d37d282745731b5c7cd7680076ea14a740cd32082ef30d706e4f4f88c68c
SHA51259386093b0374928d5f526b8d013ff1177047d827dfecd731fc6c51bb350ea18a65334844379f39ffe2bdc9b686f97fd48654158791618a4f90c556109a6c474