Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 19:40

General

  • Target

    https://gofile.io/d/KRUCik

Malware Config

Extracted

Family

remcos

Botnet

WaveSourceLeaked

C2

204.10.194.175:4444

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-46FS9Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 57 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/KRUCik
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72d046f8,0x7ffe72d04708,0x7ffe72d04718
      2⤵
        PID:3868
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:2852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4024
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
          2⤵
            PID:2052
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
            2⤵
              PID:1548
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:2524
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1
                2⤵
                  PID:2540
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:1
                  2⤵
                    PID:1068
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                    2⤵
                      PID:4080
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1316
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:1
                      2⤵
                        PID:372
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                        2⤵
                          PID:468
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:1
                          2⤵
                            PID:888
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5800 /prefetch:8
                            2⤵
                              PID:1588
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                              2⤵
                                PID:1948
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6440 /prefetch:8
                                2⤵
                                  PID:644
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:1
                                  2⤵
                                    PID:660
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6616 /prefetch:1
                                    2⤵
                                      PID:4296
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5196
                                    • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                      "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • NTFS ADS
                                      PID:5340
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                        3⤵
                                        • Checks computer location settings
                                        • System Location Discovery: System Language Discovery
                                        PID:5556
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5644
                                          • C:\ProgramData\Remcos\remcos.exe
                                            C:\ProgramData\Remcos\remcos.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: MapViewOfSection
                                            PID:5688
                                            • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                              "c:\program files (x86)\internet explorer\iexplore.exe"
                                              6⤵
                                                PID:5716
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1
                                        2⤵
                                          PID:5800
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:1
                                          2⤵
                                            PID:6072
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:1
                                            2⤵
                                              PID:6080
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:1
                                              2⤵
                                                PID:5156
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                                                2⤵
                                                  PID:5524
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:1
                                                  2⤵
                                                    PID:5712
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:1
                                                    2⤵
                                                      PID:5688
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                                                      2⤵
                                                        PID:5748
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:1
                                                        2⤵
                                                          PID:4372
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7128 /prefetch:8
                                                          2⤵
                                                            PID:5520
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:8
                                                            2⤵
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:5840
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2976221103046019649,18391573475413927320,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6020 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3124
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:1836
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:1724
                                                            • C:\Windows\System32\rundll32.exe
                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                              1⤵
                                                                PID:5960
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry class
                                                                • NTFS ADS
                                                                PID:6076
                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2968
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3244
                                                                    • C:\ProgramData\Remcos\remcos.exe
                                                                      C:\ProgramData\Remcos\remcos.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious behavior: MapViewOfSection
                                                                      PID:2228
                                                                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                        "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4048
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:6000
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:4560
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:4908
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:1704

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                99afa4934d1e3c56bbce114b356e8a99

                                                                SHA1

                                                                3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                                                SHA256

                                                                08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                                                SHA512

                                                                76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                443a627d539ca4eab732bad0cbe7332b

                                                                SHA1

                                                                86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                                                SHA256

                                                                1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                                                SHA512

                                                                923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001b

                                                                Filesize

                                                                215KB

                                                                MD5

                                                                d79b35ccf8e6af6714eb612714349097

                                                                SHA1

                                                                eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                SHA256

                                                                c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                SHA512

                                                                f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                a63a902658b370c1c5d48693df1399df

                                                                SHA1

                                                                36fe302bfec74133d355a9f22994fb98b980be9a

                                                                SHA256

                                                                634a0fc2115234dd77b28c46a14be24aac772765301e679610a34965f86db4be

                                                                SHA512

                                                                d40d8618830277333f47e5dff88fcf8f9ffefa27900ec8b1e48ced7abdfb9e32f962e53a5a5dd5fc59f211dd35d544f726ec156e524b5bc45666b8db603ff0da

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                144B

                                                                MD5

                                                                92d2dd418bb8c6a00b135c257a163eee

                                                                SHA1

                                                                084ab77b029ee43c509bc671f09addb0f39b5d97

                                                                SHA256

                                                                10ad604c34dfcc8d6243dd3fd3470db2393c3dd40bc354c2be638120ba93e90d

                                                                SHA512

                                                                e31ede49e36d83202a04bacf25af057cd32707522b61cc1dba499152b9c025913e1f1d5a49b49c93c9b8ea14e38b2e5a2e819bfff0100b50f8519ea50185e669

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                191ff59ab7400d58a5335421a7eab629

                                                                SHA1

                                                                b690589c8487d99312a36cb52e309a8b5c75b8e5

                                                                SHA256

                                                                13a536f7f8cc81c1dc35c59e56f8987a4979e5f8d4e7c94243575f6f3dfd81b0

                                                                SHA512

                                                                07a718e02c808bb7918947ef8cffec1a6c2f4572d8fc8f8db5579b859f94b2ea541b7f92b1f026573f17046be521b6a815a678fd551c2b774d38343bbfa77c02

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                cb88d723d3bf704f0e2b48f5edae9c6f

                                                                SHA1

                                                                12f34a003e2d6e1ccb21f1010f8210c996d059fb

                                                                SHA256

                                                                d3ef1c8f68d853394aed5e1e44bf64d974fcd301c11b0a83d9690db1b188e38b

                                                                SHA512

                                                                244885e1d3c6d280ed87fb582903076061757e190a9f0e6e9757c717d91e70a1839b1c683ccfbcc265958a61e0ef68b250dff9315bd7cd8be735e79f99cea95a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                2db373bdf997f8c82f2f3aa30d5d0569

                                                                SHA1

                                                                5f4c87ea353ba788a4bc3c1e2dce51584af381fe

                                                                SHA256

                                                                92a70e98229c9410fbdf3d57b237b35caa7653b77f5e928a4456da73d0d7856e

                                                                SHA512

                                                                298bf23d8835ce3eefb0b3d95d170c9d0db69c341fe2aa4fde9c4edd8132d6d571e36be7ddd2d62aa77402ca9b88625a349691ee477ef9d9a2aa47eacaa17011

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                fd1d7fe62d185d5410531c1c8542696e

                                                                SHA1

                                                                69e75744e26582da9036ddf4e9a024cc79df188b

                                                                SHA256

                                                                b2496f281c7cc31b046d010a63335bfe109c1a91a53aa501495a0b760c801a8c

                                                                SHA512

                                                                fd344ec3eff2859235500ab5deb10316e344e6d3a86c99771416f095cf63086fc658deed486a4615ba4adbe25b07684f93dc418614587033ca795bf6c689cc7a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                3ab323c2adfb35ff46475be59a44587e

                                                                SHA1

                                                                b6085f18fae11f4c42e6b2889c89cbbbd54ff72a

                                                                SHA256

                                                                9948b6d274e91bd5fb6e494fbf9f9135803c7d34cda252f75e76fedfee003a19

                                                                SHA512

                                                                507788b74e10b66e391ed873f64e8627076b6cec40ff638e9dca9deff488ce4d1fa5080004357991d4a0735ea5e8ec267fa14dc2c5da40442978cf1f04260dc3

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                81ebb6bb69c03c4ac5a04c5cbc830e9d

                                                                SHA1

                                                                53eb17250472e0baa5b3f00de488ea86cb60c3e6

                                                                SHA256

                                                                0ed3d301336f13bed5228d3b1199ae4b8db20a37c9a8bc8531cf409102ec2730

                                                                SHA512

                                                                c89c38cde2fec74c14c8e610f379f85c40ae4bc453faf0c841fe5fd17f9d833db3d1b5c7a978bded32cac7f6503f171aee10242645133949d2485e4d7c4b509b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                f3ee7e0cb775002de61024912b8bb96c

                                                                SHA1

                                                                142b2db1b1ba04fe4d1cb011606823a7bea3295f

                                                                SHA256

                                                                e31bfd436a7b6c8ca2beccba611f14885134ba35a94cdd9b5b88862089df7e95

                                                                SHA512

                                                                1e24ace330f99bf88e76d27979500dbd417260903f1cbcafdca092f494d30fe3d6fcca114d9cb624d2a95266807285f6a2a704d900cc43887e1e302f9b2a784e

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                Filesize

                                                                72B

                                                                MD5

                                                                0be70bd2deace8b1c2d0481003ba937f

                                                                SHA1

                                                                414a0c487bcbb150455e8ce715bbfd20ae10c143

                                                                SHA256

                                                                b90446c0315e88f31365f9e48fe52cc16e443590a0dfb4ffa9f02ad483212da5

                                                                SHA512

                                                                d2f20d81cef0e45b1d8fb671c4ba2be85d78f093a0ba14af3b4c72c61e7bc7aca432a922726b726f03480277682ac772951e589661be67ff1f07f51b2fa3ca11

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58c994.TMP

                                                                Filesize

                                                                48B

                                                                MD5

                                                                40faea3c881ad2ef8fde2154bf21b95b

                                                                SHA1

                                                                a9bdbf66000c3804349e5d02ce90f57aa41f93a1

                                                                SHA256

                                                                db59dce31e81b0715c70180b1a5aa684988828d59ec5fc5f468b0c17b7d12c71

                                                                SHA512

                                                                ae87cf55f55d40dbea555160b2dbd8721411a5bc53902f48717953f5d344206922589778557a550eeef057625b39ab54accdbc71cf4f0d6e1b7d2f34f763d1c7

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                87e9ab49f24ae6a82939371e455c0b82

                                                                SHA1

                                                                5905c6878df35b4fe279bc4904eae6e607621afc

                                                                SHA256

                                                                abeb2d54742760b01b066d6e474b43dd5261a653732ee58ce7238173f3cebe84

                                                                SHA512

                                                                14e4145e6eccf507caad7bfbae65e4d4064461e2c9a1422293ccee2f80367b184f404d29db95d32041c028ddb0e1a6a072b8355d3aae288e2b11448da8912a57

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe588ad6.TMP

                                                                Filesize

                                                                538B

                                                                MD5

                                                                ba60f86d8684b876d765484142c0a3eb

                                                                SHA1

                                                                40790c9279938ba7b97314e7228a095b169aad8c

                                                                SHA256

                                                                4eacb7f483a808a0b3cd7f2be7514a56389422b0b1ee9afecf39a59138bab8e0

                                                                SHA512

                                                                a7effb4058b1ab84fab79b85d9e7294b9889b406e6724e2e037055f860331de009e11075ffd755dc3ae3a174a3d9b08b80c5d69f73e1482cd625c6556f3ef8c4

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                206702161f94c5cd39fadd03f4014d98

                                                                SHA1

                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                SHA256

                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                SHA512

                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                46295cac801e5d4857d09837238a6394

                                                                SHA1

                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                SHA256

                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                SHA512

                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                287d38fa36b6a320b27831f5a9223c5e

                                                                SHA1

                                                                987c6b37a6bdf5c9689a6c6da9bc336723f477e0

                                                                SHA256

                                                                80f991e01c2788af454dc11138f65c38a71563a7965f00af622ca3e02967b0ca

                                                                SHA512

                                                                eb2c0ad29bd170abc5df81843e47d5a0782149d78c7fcaa7086b6c09da3a424df7f93ddcb06e9c2675da18ec1c9a53f6cf2d22518aa1befb6f884ac23cb16f7d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                67568a4153d29f787b10de72f5738b8b

                                                                SHA1

                                                                2b658c37c2dba66e187beac2385ac38603551f45

                                                                SHA256

                                                                7cdc6ed076745e26aae93b990cdb47516b614bb41d3936d0382cdcee56174908

                                                                SHA512

                                                                fd1d18377a8b8757878192104414dfdfba8bf794d4658e953f3fbaa261f21855b597e014efed2336bc06e840135441bd921dfd0fa3222bbd248e88cf57fd14f5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                15b8f36b75f1798af68e7f7e806cac5d

                                                                SHA1

                                                                5e1c0759278ced3ebb3be3cef6d650aa27c9bb31

                                                                SHA256

                                                                2d6759810a098b356b060504b697ff45d0f9476f0aed0f88b2b66395f8ff1310

                                                                SHA512

                                                                f72e1319075fd9bf08227c76ba6a818e3e1c470c51eb1fb5b6bfddd14a254ab50b022aaf324950f8cb2a1829b8896cbf65ec014227cca57d14ba33777bd82360

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                818577643fa354b9b1d7150f170f3e1f

                                                                SHA1

                                                                f4026c66b41baad3472d1f8e33b8c9d49762cf88

                                                                SHA256

                                                                1d3bb7aa294b4aed50a5756ce9e5fd7fbfb35443a4cf69a5ca3021841d3ef34a

                                                                SHA512

                                                                e8495771aea6ad4af3ff8e843af2cc3a685b65816e46128cd78ad7d1365698a9c040e66664845963cc066734180250b25603fd319664fda41edeabf55e77b387

                                                              • C:\Users\Admin\AppData\Local\Temp\install.vbs

                                                                Filesize

                                                                386B

                                                                MD5

                                                                1ec6289c6fd4c2ded6b2836ed28cbeb5

                                                                SHA1

                                                                c4e08195e6c640eb8860acc03fda1d649b4fe070

                                                                SHA256

                                                                6efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2

                                                                SHA512

                                                                20bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288

                                                              • C:\Users\Admin\Downloads\Unconfirmed 939682.crdownload

                                                                Filesize

                                                                469KB

                                                                MD5

                                                                e468b718e67495ea73c85d8258059adf

                                                                SHA1

                                                                dcad70f5c39ab85f900ef1288067dbf51eaeb503

                                                                SHA256

                                                                fa9f629254a8bbe915bbd587c0c060de580a18992103858a1d16686de8bd717e

                                                                SHA512

                                                                b4eb6cc848b5ebfc6bab7e1cc033ec468bc8cf2fed72ea912f9fc60d6eaab75664f4627646960dccab2aceefeab9c5acbd2fe1b57d992c62358929b4d840dedb

                                                              • memory/4048-515-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-514-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-513-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-516-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-518-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-519-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-520-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-555-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/4048-556-0x0000000000610000-0x000000000068F000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/5716-140-0x0000000000D80000-0x0000000000DFF000-memory.dmp

                                                                Filesize

                                                                508KB

                                                              • memory/5716-141-0x0000000000D80000-0x0000000000DFF000-memory.dmp

                                                                Filesize

                                                                508KB