Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 08:47
Behavioral task
behavioral1
Sample
c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe
Resource
win10v2004-20241007-en
General
-
Target
c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe
-
Size
92KB
-
MD5
de9d4c9c1009d24b1fb38205a5277beb
-
SHA1
46f4afb0f5763067fa52060fbcb387e3951fb4bf
-
SHA256
c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a
-
SHA512
222f003d201fdc5fb53df1d40cb7bcfb9c5c6a831a4347ca67b8cf25a015a9189573b59f270e2212877ea3197506cb80d49385611a988cb160f15032d7187474
-
SSDEEP
1536:IhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP6vrv:OhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+s
Malware Config
Extracted
remcos
1.7 Pro
Host
tobi12345.hopto.org:50501
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
win32.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_xfazsapjhi
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe -
Executes dropped EXE 1 IoCs
pid Process 1324 win32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\win32.exe\"" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\win32.exe\"" c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\win32.exe\"" c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\win32.exe\"" win32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3880 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3880 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 win32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 4428 2032 c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe 84 PID 2032 wrote to memory of 4428 2032 c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe 84 PID 2032 wrote to memory of 4428 2032 c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe 84 PID 4428 wrote to memory of 3880 4428 cmd.exe 86 PID 4428 wrote to memory of 3880 4428 cmd.exe 86 PID 4428 wrote to memory of 3880 4428 cmd.exe 86 PID 4428 wrote to memory of 1324 4428 cmd.exe 87 PID 4428 wrote to memory of 1324 4428 cmd.exe 87 PID 4428 wrote to memory of 1324 4428 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe"C:\Users\Admin\AppData\Local\Temp\c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3880
-
-
C:\Users\Admin\AppData\Roaming\remcos\win32.exe"C:\Users\Admin\AppData\Roaming\remcos\win32.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5439c16a11c6e6dbbd7916dac62cf877d
SHA1a86ed4301e82487fc590f64c3075a122e6f93235
SHA2563ec6d79a891354eae53a13236ab2db1e058dd9af3af90b150b59ad069f5ff7c1
SHA5123ae50584e41c1884bb76d313e47c5423abfce62870993e0061467675d6a38f99cda80bf4bb82283e4552ea04906fcf2c87a6d158999d1592d6e8691078508999
-
Filesize
92KB
MD5de9d4c9c1009d24b1fb38205a5277beb
SHA146f4afb0f5763067fa52060fbcb387e3951fb4bf
SHA256c64129ee795961963a0df968f6f460704f8bbe0622bea2e8958109a67e1c471a
SHA512222f003d201fdc5fb53df1d40cb7bcfb9c5c6a831a4347ca67b8cf25a015a9189573b59f270e2212877ea3197506cb80d49385611a988cb160f15032d7187474