Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe
Resource
win10v2004-20241007-en
General
-
Target
9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe
-
Size
293KB
-
MD5
90685b3446365662273f08298a9724c3
-
SHA1
2f1881d820114d9e567aaf3185754f6d0cdc0645
-
SHA256
9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a
-
SHA512
d7675048d87e3265665339b9f57c34d9d6070507d935e7e8d7bcb2681434c3a8e6a6999aa901f0d9bf1ac872079a95daaa595eb04340cf14175323f3154ca981
-
SSDEEP
6144:f5ZdP3uQMi7StiABLHGEEUqdGrxrL0Or1jQQdy02sbYB:fdP3d2uO0Or1WkbYB
Malware Config
Extracted
remcos
2.1.0 Pro
Planes
remfff.duckdns.org:48604
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
csrss.exe
-
copy_folder
csrss.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
RemcosXs-L20P2E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
csrss.exe
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 1416 csrss.exe 2368 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\\csrss.exe\"" 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\\csrss.exe\"" csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe 1416 csrss.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 1416 csrss.exe 1416 csrss.exe 2368 csrss.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 2892 wrote to memory of 876 2892 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 89 PID 876 wrote to memory of 1108 876 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 90 PID 876 wrote to memory of 1108 876 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 90 PID 876 wrote to memory of 1108 876 9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe 90 PID 1108 wrote to memory of 2436 1108 WScript.exe 91 PID 1108 wrote to memory of 2436 1108 WScript.exe 91 PID 1108 wrote to memory of 2436 1108 WScript.exe 91 PID 2436 wrote to memory of 1416 2436 cmd.exe 93 PID 2436 wrote to memory of 1416 2436 cmd.exe 93 PID 2436 wrote to memory of 1416 2436 cmd.exe 93 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98 PID 1416 wrote to memory of 2368 1416 csrss.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe"C:\Users\Admin\AppData\Local\Temp\9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe"C:\Users\Admin\AppData\Local\Temp\9fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422B
MD5f3ed21a8dbf48ccf6487d68cd12b8e89
SHA137b725cdc3bb8b91cb6242529721a2c3f1f03af2
SHA256a2c8cc5a927929bb186c39f2deefa5ca869ab705ada7b13c2687a54c99df0416
SHA512da85bc3517b3d085a29ae9c1a200ca7ae6c46f6bff4d5dc199bf493e6eda9cd223acf3945a4e24ae24f5a7fbc134f0345d725a6af1061b6c3f526ffec599851f
-
Filesize
293KB
MD590685b3446365662273f08298a9724c3
SHA12f1881d820114d9e567aaf3185754f6d0cdc0645
SHA2569fa65520148046f0e3791249d36a42ec4401f8f5db36091bc63156c778e4252a
SHA512d7675048d87e3265665339b9f57c34d9d6070507d935e7e8d7bcb2681434c3a8e6a6999aa901f0d9bf1ac872079a95daaa595eb04340cf14175323f3154ca981
-
Filesize
79B
MD5fa66a1422cbc7fe1bbfc3621150f4018
SHA1316d5cca2644650192c25dcb3a182d012adeb065
SHA256afc336acbb5843c1766330a8f9431a5c5548121c771ec5e80649071bae0137e2
SHA512e118894009d3b5db3a945507c607328198f972af404b74d3a394e0d6e254e6c5e36ed319fd20d38ebef6fb1ae2506a0fdac8f5aaa716b4691071cf1ea3a0e47c