Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 19:49

General

  • Target

    c793394ea0bd214459520e1403e523cf59936ddfe5a1a60ad59e0457143725e5.exe

  • Size

    1.1MB

  • MD5

    f47ede3af9a6ca374a0a54a4194dd7d2

  • SHA1

    523f74e5de756049cf0445ee135879678c93c80a

  • SHA256

    c793394ea0bd214459520e1403e523cf59936ddfe5a1a60ad59e0457143725e5

  • SHA512

    e74d3fb2654a816188a7a4273f25022dfd1f4764b92861c1d72cc61343899a3195a10256f9c86e4dfd404e1fa141a7cc2daf4e2a9aeadf8100fe47d7a0722267

  • SSDEEP

    24576:PK777777777777dFYVE6/Lf0BfGqv0xs7qdZmTgwOK545tq:y7777777777774feG1CqXmUIW5

Malware Config

Extracted

Family

remcos

Botnet

srvchostrix

C2

winvohost.ddns.net:11024

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-U0TX4T

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c793394ea0bd214459520e1403e523cf59936ddfe5a1a60ad59e0457143725e5.exe
    "C:\Users\Admin\AppData\Local\Temp\c793394ea0bd214459520e1403e523cf59936ddfe5a1a60ad59e0457143725e5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\remcos\logs.dat

    Filesize

    144B

    MD5

    875ca204f77f2a28801a550d8753b95b

    SHA1

    4844997d6bb1a979c48286d042efe70dcfa9554f

    SHA256

    140ea9ea11d1e69696885aea6de966c079e4edf5281f314cfc165964a204cf37

    SHA512

    b1068a7f0dc8795ad67b575ea4e6b33a4a7cc8505a04495df8a04d9da2ea00b591b26aab638f1341d4f0c5f2f6dae914452d222c2115a498d7951b7d84cc5252

  • memory/2092-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

    Filesize

    4KB

  • memory/2092-1-0x00000000001E0000-0x0000000000302000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-2-0x00000000747C0000-0x0000000074EAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2092-3-0x00000000004F0000-0x0000000000500000-memory.dmp

    Filesize

    64KB

  • memory/2092-4-0x00000000747CE000-0x00000000747CF000-memory.dmp

    Filesize

    4KB

  • memory/2092-5-0x00000000747C0000-0x0000000074EAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2092-6-0x00000000056E0000-0x00000000057DA000-memory.dmp

    Filesize

    1000KB

  • memory/2092-7-0x00000000054F0000-0x000000000556A000-memory.dmp

    Filesize

    488KB

  • memory/2092-31-0x00000000747C0000-0x0000000074EAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2752-12-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-15-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-11-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-9-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-27-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-30-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-26-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-24-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2752-18-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-16-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-8-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2752-21-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB