Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 21:23
Behavioral task
behavioral1
Sample
57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe
Resource
win10v2004-20241007-en
General
-
Target
57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe
-
Size
469KB
-
MD5
489ba8cc178a4c67825a20800a761f90
-
SHA1
7945f460895062c2e90cc871fb92a84e2f43dedd
-
SHA256
57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082ae
-
SHA512
bb366830d8e1cc38530991a794fc43aecd58d1cc5448a9a7727a70f9ca47eb9dba185b6ca12755c6cada5dab46b4890c3deee2baff8378de04eee67fe349b467
-
SSDEEP
12288:Omnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS1n9:2iLJbpI7I2WhQqZ719
Malware Config
Extracted
remcos
WindowsUpdater
204.10.194.175:1337
204.10.194.175:4444
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
WindowsUpdater.exe
-
copy_folder
Windows
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-1O3BBM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 1 IoCs
pid Process 2084 WindowsUpdater.exe -
Loads dropped DLL 4 IoCs
pid Process 1616 cmd.exe 2084 WindowsUpdater.exe 2084 WindowsUpdater.exe 2084 WindowsUpdater.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Windows\\WindowsUpdater.exe\"" 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Windows\\WindowsUpdater.exe\"" 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Windows\\WindowsUpdater.exe\"" WindowsUpdater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Windows\\WindowsUpdater.exe\"" WindowsUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdater.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2576 2536 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe 30 PID 2536 wrote to memory of 2576 2536 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe 30 PID 2536 wrote to memory of 2576 2536 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe 30 PID 2536 wrote to memory of 2576 2536 57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe 30 PID 2576 wrote to memory of 1616 2576 WScript.exe 31 PID 2576 wrote to memory of 1616 2576 WScript.exe 31 PID 2576 wrote to memory of 1616 2576 WScript.exe 31 PID 2576 wrote to memory of 1616 2576 WScript.exe 31 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33 PID 1616 wrote to memory of 2084 1616 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe"C:\Users\Admin\AppData\Local\Temp\57957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082aeN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Windows\WindowsUpdater.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\ProgramData\Windows\WindowsUpdater.exeC:\ProgramData\Windows\WindowsUpdater.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD52f98722cc4943d7a5def5d6ef309550d
SHA121a997086c17abda040935661378ec961a57a3fd
SHA256909ff54b9b8fae48e63c195919dda475c7bb8c67adc0701fb4b9fbec782c580a
SHA512161f94dfafc0511a7cad3bad98385eab04e8642da59bb88788233426fd1edd4966a72cf37dac54b902e5a09d7a7c7009c88a03b40dd843827578859ac3680c6f
-
Filesize
469KB
MD5489ba8cc178a4c67825a20800a761f90
SHA17945f460895062c2e90cc871fb92a84e2f43dedd
SHA25657957975ce015de2c017af1ad179f1181ac4ee2ddbf8298a5568731ab17082ae
SHA512bb366830d8e1cc38530991a794fc43aecd58d1cc5448a9a7727a70f9ca47eb9dba185b6ca12755c6cada5dab46b4890c3deee2baff8378de04eee67fe349b467