Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 17:36

General

  • Target

    039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe

  • Size

    140KB

  • MD5

    c756a2338f5a176d3980852b6314dc7e

  • SHA1

    a2d3e69abc628a43c02e7538d31023d3138fd0bd

  • SHA256

    039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c

  • SHA512

    336d2a871149d487de7c2fc9887ff381305076caaed6865cf313fe69c694b57ca9872f74dde137a345563ab7ec00f93ad3643e40298cb17f74059182a935ace0

  • SSDEEP

    3072:iq7eoTLJQYF6kUCkAODrIlPzBBQGkAVFOnpYwZnQqO8b6x:XxStAODrIlrBSiSmub6

Malware Config

Extracted

Family

remcos

Version

1.9.2 Pro

Botnet

MXSV

C2

casillas.hicam.net:2404

casillasmx.chickenkiller.com:2404

casillas45.hopto.org:2404

casillas.libfoobar.so:2404

du4alr0ute.sendsmtp.com:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    rem92-P9KLDM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe
    "C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe
      "C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2848
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe" C:\Users\Admin\AppData\Local\Temp\039308d47114c1bc4976d88869edf65d7f0658cb11a9eca534123578219b8c6c.exe 2848 54bdec4d6fd4410eb5befd55dc4d5447
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

    Filesize

    514B

    MD5

    53804df72766bcb16d9039995b68e4fd

    SHA1

    380aa1f64ac0e672eb7968ec8fd173fa7ac29089

    SHA256

    6bf8e10a40ef563553d15375b13d2295bf0722e9e094fd89fd687f16ff1e7597

    SHA512

    82ebe163e12360be2a3af777fed23e4ad4f91b90e06607b8bf64ae03c7d7a0431607fa53a78596f1612fa1afe13e1302b8a8a19d50f4bf9e53697a2554cc4d5c

  • memory/2848-13-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2848-3-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2848-7-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2848-21-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4264-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4264-20-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4264-18-0x0000000074802000-0x0000000074803000-memory.dmp

    Filesize

    4KB

  • memory/4264-22-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4456-2-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4456-0-0x0000000074802000-0x0000000074803000-memory.dmp

    Filesize

    4KB

  • memory/4456-1-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB

  • memory/4456-19-0x0000000074800000-0x0000000074DB1000-memory.dmp

    Filesize

    5.7MB