Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 01:34

General

  • Target

    46004e5408d63486737753e360a3c9ef74246163497c920d1ac7aa504c488e54.msi

  • Size

    2.8MB

  • MD5

    a2a7ff35bd33480418bd39e0832d0875

  • SHA1

    8cd2ec2310b1240ffa9944631c409e658cea03a7

  • SHA256

    46004e5408d63486737753e360a3c9ef74246163497c920d1ac7aa504c488e54

  • SHA512

    20b4bcc20bdd3d40ec0d2d3f8531615c5fce78339784dd8f346e6aeccdca8307f472e59d9f246daeb1e1a4343c9d6d53f83b2deb7eb21f5b4035b2d083ad037c

  • SSDEEP

    49152:IiSoOl+YyNuCClJkqwhmsl5aBZJnxsTKHgX7Gu0ojmWS8MqIugHt:It7+YJCCvkEsloxTHZojmWhDg

Malware Config

Extracted

Family

remcos

Botnet

Teddy

C2

adminitpal.com:8080

adminitpal.com:443

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    5

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    putty

  • mouse_option

    false

  • mutex

    tRvr-YKFHJK

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Putty

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;chrome;edge;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\46004e5408d63486737753e360a3c9ef74246163497c920d1ac7aa504c488e54.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5048
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4448
      • C:\Users\Admin\AppData\Local\Regma\ManyCam.exe
        "C:\Users\Admin\AppData\Local\Regma\ManyCam.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\system32\pcaui.exe
          "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Regma\ManyCam.exe"
          3⤵
            PID:4672
          • C:\Users\Admin\AppData\Roaming\SyncvalidKil3\ManyCam.exe
            C:\Users\Admin\AppData\Roaming\SyncvalidKil3\ManyCam.exe
            3⤵
            • Suspicious use of SetThreadContext
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\system32\pcaui.exe
              "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Roaming\SyncvalidKil3\ManyCam.exe"
              4⤵
                PID:3496
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\SysWOW64\cmd.exe
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:3304
                • C:\Users\Admin\AppData\Local\Temp\Demowordpad.exe
                  C:\Users\Admin\AppData\Local\Temp\Demowordpad.exe
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2988
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:1592

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57d64c.rbs

          Filesize

          9KB

          MD5

          991ae1bb7361360dda229d12a53e6f38

          SHA1

          fa16f3fb934753f12155acad17f5a9e55b8148d2

          SHA256

          37fa670f7f7b6f3c3f81120a73b21ce2066acbae188538186f140fdc06d9df6f

          SHA512

          8c0e6296a01a735e79c1d1e4be85e09fe94997a08e405c3398223733d2e0fb1a6208303d4ada9738af0de61517dbe2ad2f0977070cd7cc60c8e970fa27f02ff1

        • C:\ProgramData\putty\logs.dat

          Filesize

          184B

          MD5

          b91db9a882f2874e6b9a9bd7a7006b64

          SHA1

          2df83d58c55578c057a85c22d245319a200cb2ec

          SHA256

          03b293d06a51ec56b8ae37bb57e0acd5d031eaa517a289e148656a93fa4b42b0

          SHA512

          13a170119d6cf3b2cee98bd8531f9090cf4b49ec60f7a59f2f0a6c9150c2e6387cd6b5a94695799153291fa8612b2bdac850692e7ed36e85697c2764a790c94e

        • C:\Users\Admin\AppData\Local\Regma\CrashRpt.dll

          Filesize

          121KB

          MD5

          b2d1f5e4a1f0e8d85f0a8aeb7b8148c7

          SHA1

          871078213fcc0ce143f518bd69caa3156b385415

          SHA256

          c28e0aec124902e948c554436c0ebbebba9fc91c906ce2cd887fada0c64e3386

          SHA512

          1f6d97e02cd684cf4f4554b0e819196bd2811e19b964a680332268bcbb6dee0e17b2b35b6e66f0fe5622dffb0a734f39f8e49637a38e4fe7f10d3b5182b30260

        • C:\Users\Admin\AppData\Local\Regma\ManyCam.exe

          Filesize

          1.7MB

          MD5

          ba699791249c311883baa8ce3432703b

          SHA1

          f8734601f9397cb5ebb8872af03f5b0639c2eac6

          SHA256

          7c4eb51a737a81c163f95b50ec54518b82fcf91389d0560e855f3e26cec07282

          SHA512

          6a0386424c61fbf525625ebe53bb2193accd51c2be9a2527fd567d0a6e112b0d1a047d8f7266d706b726e9c41ea77496e1ede186a5e59f5311eeea829a302325

        • C:\Users\Admin\AppData\Local\Regma\cv099.dll

          Filesize

          664KB

          MD5

          2a8b33fee2f84490d52a3a7c75254971

          SHA1

          16ce2b1632a17949b92ce32a6211296fee431dca

          SHA256

          faff6a0745e1720413a028f77583fff013c3f4682756dc717a0549f1be3fefc2

          SHA512

          8daf104582547d6b3a6d8698836e279d88ad9a870e9fdd66c319ecada3757a3997f411976461ed30a5d24436baa7504355b49d4acec2f7cdfe10e1e392e0f7fb

        • C:\Users\Admin\AppData\Local\Regma\cxcore099.dll

          Filesize

          908KB

          MD5

          60ad2fc365dc3de0ce1fd191acc6a0b0

          SHA1

          8c85bf1b8734b150cf2afdfe64c1227dbef25393

          SHA256

          cf58a2f246d7d081986b44b14abc810c256c4f594738659e522476bcd7977d8c

          SHA512

          65b093547569a4c06028ec723be3d562102153741bd71a0dc6a16a2e96d56cb2101f5d1ebeddb235c570a12ec5834aa5f8529bf446dfc31f677d6150319bf65b

        • C:\Users\Admin\AppData\Local\Regma\cximagecrt.dll

          Filesize

          487KB

          MD5

          c36f6e088c6457a43adb7edcd17803f3

          SHA1

          b25b9fb4c10b8421c8762c7e7b3747113d5702de

          SHA256

          8e1243454a29998cc7dc89caecfadc0d29e00e5776a8b5777633238b8cd66f72

          SHA512

          87cad4c3059bd7de02338922cf14e515af5cad663d473b19dd66a4c8befc8bce61c9c2b5a14671bc71951fdff345e4ca7a799250d622e2c9236ec03d74d4fe4e

        • C:\Users\Admin\AppData\Local\Regma\dbghelp.dll

          Filesize

          478KB

          MD5

          e458d88c71990f545ef941cd16080bad

          SHA1

          cd24ccec2493b64904cf3c139cd8d58d28d5993b

          SHA256

          5ec121730240548a85b7ef1f7e30d5fdbee153bb20dd92c2d44bf37395294ec0

          SHA512

          b1755e3db10b1d12d6eaffd1d91f5ca5e0f9f8ae1350675bc44ae7a4af4a48090a9828a8acbbc69c5813eac23e02576478113821cb2e04b6288e422f923b446f

        • C:\Users\Admin\AppData\Local\Regma\highgui099.dll

          Filesize

          388KB

          MD5

          a354c42fcb37a50ecad8dde250f6119e

          SHA1

          0eb4ad5e90d28a4a8553d82cec53072279af1961

          SHA256

          89db6973f4ec5859792bcd8a50cd10db6b847613f2cea5adef740eec141673b2

          SHA512

          981c82f6334961c54c80009b14a0c2cd48067baf6d502560d508be86f5185374a422609c7fdc9a2cde9b98a7061efab7fd9b1f4f421436a9112833122bc35059

        • C:\Users\Admin\AppData\Local\Regma\sobrt

          Filesize

          51KB

          MD5

          5ba0e4ef5bb61db3b1554a108118ed45

          SHA1

          1004db2678baa94e1a9f99e767673514b0122a21

          SHA256

          d26373617c8ef46daa7482688b17ae8153a633ea2fe75053282f0f4308903f57

          SHA512

          62b43ecc1dc6f5d58283b164278b01fe5fb00963d712d3d4ed5b97fcb22c7c46010142ffe65c2df74b80edd6e48754fddf446f23dc28787dc008e156d3f54b3c

        • C:\Users\Admin\AppData\Local\Regma\xtda

          Filesize

          1.1MB

          MD5

          7910d6147f32875538e6d887c32522ed

          SHA1

          50f9a0a38b87f48c655ab45de0e25637f070e12d

          SHA256

          45d1882a8df64a9fa624cd4538bb17161633ae66a5c4d0aea7d2f17a274a6416

          SHA512

          2de6830a7b9fcf8e6ed08c870bd531705f8094f79205761606b40655b75686205871aa92968b5e2568afd741f2a09363efbd296304c61beddce3ffd15e1de742

        • C:\Users\Admin\AppData\Local\Temp\Demowordpad.exe

          Filesize

          433KB

          MD5

          fea067901f48a5f1faf7ca3b373f1a8f

          SHA1

          e8abe0deb87de9fe3bb3a611234584e9a9b17cce

          SHA256

          bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

          SHA512

          07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

        • C:\Users\Admin\AppData\Local\Temp\bb355d15

          Filesize

          1.6MB

          MD5

          604545daa0e0da4f66d22bd314d17009

          SHA1

          ca7e179b30c0b92a4fee5424d7bbbf2e4959d25f

          SHA256

          2b16d3300ea38f7d02cc15739780ded84f1f6908e278300dc7702737a02b7f49

          SHA512

          5c769a8c55e294e882e10cd747bd5ab3a7a8571c07df75458e7d67aecfb02df14455272f4be883f1436cbf1d9b437517e7a8e0ca1226fdc3a277459fac55e789

        • C:\Windows\Installer\e57d64b.msi

          Filesize

          2.8MB

          MD5

          a2a7ff35bd33480418bd39e0832d0875

          SHA1

          8cd2ec2310b1240ffa9944631c409e658cea03a7

          SHA256

          46004e5408d63486737753e360a3c9ef74246163497c920d1ac7aa504c488e54

          SHA512

          20b4bcc20bdd3d40ec0d2d3f8531615c5fce78339784dd8f346e6aeccdca8307f472e59d9f246daeb1e1a4343c9d6d53f83b2deb7eb21f5b4035b2d083ad037c

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          24.1MB

          MD5

          e6d286d02d7d8f1a18681c036a88ed9e

          SHA1

          f45063d62fc85f0153bb8fbfd4a5f0c8a17b3608

          SHA256

          3f8ee0c3f012d6162be72e5508cbe039d72e1e7c4bfc81bac01a38ca9b0133da

          SHA512

          9b6674d39da0ee255eaf0b5d0655b481e268c9706e4c125e6290422c8552c8a1b0307623021f0e432c617c76748af5d61fce80fd152841bfbd06a04244666be7

        • \??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{832d1d82-06c2-4626-80f0-9328b76155dd}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          1525f5aeb9a3e23d9301aede49a3a036

          SHA1

          1db9f46726a29cc7479d51d77b8f9818b5948a57

          SHA256

          4b60212722d071ecedb4ccf2cc99bd3ab3a022af22a076767a9b759808d95f8c

          SHA512

          41393e8d3943bf63d197060e5b7d4ace4c0260beca0d2d10b36804f16920c34a5b2996aab468b148bc81356dfd2a44d5c81b1da5c8cc1a2a78a0b9a1db36cb27

        • memory/2340-49-0x00000000016E0000-0x000000000178D000-memory.dmp

          Filesize

          692KB

        • memory/2340-58-0x0000000074F10000-0x000000007508B000-memory.dmp

          Filesize

          1.5MB

        • memory/2340-59-0x00007FFBD34D0000-0x00007FFBD36C5000-memory.dmp

          Filesize

          2.0MB

        • memory/2340-46-0x0000000001660000-0x00000000016D8000-memory.dmp

          Filesize

          480KB

        • memory/2340-52-0x0000000001790000-0x00000000017F2000-memory.dmp

          Filesize

          392KB

        • memory/2660-88-0x0000000000C30000-0x0000000000C92000-memory.dmp

          Filesize

          392KB

        • memory/2660-85-0x0000000000B40000-0x0000000000C2C000-memory.dmp

          Filesize

          944KB

        • memory/2660-97-0x0000000074F10000-0x000000007508B000-memory.dmp

          Filesize

          1.5MB

        • memory/2660-95-0x0000000074F10000-0x000000007508B000-memory.dmp

          Filesize

          1.5MB

        • memory/2660-96-0x00007FFBD34D0000-0x00007FFBD36C5000-memory.dmp

          Filesize

          2.0MB

        • memory/2660-91-0x0000000000CC0000-0x0000000000D6D000-memory.dmp

          Filesize

          692KB

        • memory/2988-127-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-113-0x00007FFBD34D0000-0x00007FFBD36C5000-memory.dmp

          Filesize

          2.0MB

        • memory/2988-115-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-118-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-121-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-124-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-130-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-134-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-137-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/2988-140-0x0000000000400000-0x0000000000481000-memory.dmp

          Filesize

          516KB

        • memory/3304-103-0x0000000074F10000-0x000000007508B000-memory.dmp

          Filesize

          1.5MB

        • memory/3304-100-0x00007FFBD34D0000-0x00007FFBD36C5000-memory.dmp

          Filesize

          2.0MB