Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 17:36

General

  • Target

    039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe

  • Size

    140KB

  • MD5

    c756a2338f5a176d3980852b6314dc7e

  • SHA1

    a2d3e69abc628a43c02e7538d31023d3138fd0bd

  • SHA256

    039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c

  • SHA512

    336d2a871149d487de7c2fc9887ff381305076caaed6865cf313fe69c694b57ca9872f74dde137a345563ab7ec00f93ad3643e40298cb17f74059182a935ace0

  • SSDEEP

    3072:iq7eoTLJQYF6kUCkAODrIlPzBBQGkAVFOnpYwZnQqO8b6x:XxStAODrIlrBSiSmub6

Malware Config

Extracted

Family

remcos

Version

1.9.2 Pro

Botnet

MXSV

C2

casillas.hicam.net:2404

casillasmx.chickenkiller.com:2404

casillas45.hopto.org:2404

casillas.libfoobar.so:2404

du4alr0ute.sendsmtp.com:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    rem92-P9KLDM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe
    "C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe
      "C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe"
      2⤵
        PID:3056
      • C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe
        "C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3020
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe" C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe 3020 54bdec4d6fd4410eb5befd55dc4d5447
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

      Filesize

      514B

      MD5

      6d8d4b76cbd03a2d295c2a763f3e6563

      SHA1

      4b14b8c9101c0457efa052e015a4a27fe1fc1d56

      SHA256

      8eb74d974823fade3028c7f7ee9839247751ea065c926d3a2ca8997923666c9f

      SHA512

      c33a395b5d89cf220e866ab22a3532edc2c1be7c9a75996f901a7ceb09cb6e499bfbabf4bb9a73ff26e8a6b8561cbbe6b273c8d9794cea6887e03c3c3398c5fe

    • memory/2540-0-0x0000000074621000-0x0000000074622000-memory.dmp

      Filesize

      4KB

    • memory/2540-2-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2540-43-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2540-1-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2924-44-0x0000000074622000-0x0000000074624000-memory.dmp

      Filesize

      8KB

    • memory/2924-28-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-18-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-20-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-34-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-22-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2924-36-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2924-24-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/3020-11-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-29-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-17-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-32-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-3-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-5-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-9-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3020-15-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-7-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3020-45-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB