Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 03:01

General

  • Target

    msword.exe

  • Size

    500.0MB

  • MD5

    6bcf42715fd1768fe1013c702612d0ee

  • SHA1

    d7affe603f5d7bbca046aa4ab26bfa458c30c348

  • SHA256

    71a2295583db11053ac6d0a6770199352bc2f549212548d362e56258ee1cdd50

  • SHA512

    e749b377c6b19bf8fc42c06fef9a81024e66b190439260f7a7474eeed8a78e2fa2ea56614aceb37110ac4aba2772fdb144965cf99e091efb39d444daa2da839f

  • SSDEEP

    49152:MVgNiAinrcTVQO6kpZJpe8bMBckBTL26otm:MV8ifArpZy8bVkVL26km

Malware Config

Extracted

Family

remcos

Botnet

2024

C2

me-work.com:7009

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LOARC0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\msword.exe
        "C:\Users\Admin\AppData\Local\Temp\msword.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Market Market.cmd && Market.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2068
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2088
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2012
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 677826
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2380
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "MechanicalDlModularRuSchedulingVisibilityProposalsClimb" Hearings
            4⤵
            • System Location Discovery: System Language Discovery
            PID:344
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Charged + ..\Syndicate + ..\Controversy + ..\Fig + ..\Phentermine + ..\Peripheral + ..\Lets + ..\Usgs + ..\Viewed + ..\Dealer + ..\Matter N
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1684
          • C:\Users\Admin\AppData\Local\Temp\677826\Prostores.com
            Prostores.com N
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2472
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1836
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\Admin\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Troubleshooting" /tr "wscript //B 'C:\Users\Admin\AppData\Local\MediaFusion Technologies Inc\CineBlend.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & echo URL="C:\Users\Admin\AppData\Local\MediaFusion Technologies Inc\CineBlend.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CineBlend.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      558c30646013bb920d77575f87762ee8

      SHA1

      33ab8e75becc9821c9dd16037e963d405aef389b

      SHA256

      dcefcab20fea94a5c298269de723a98dc984f78981f657cac828203d237666e6

      SHA512

      0caad34334d3de5ce0c4188fdb2d6cae2847ced6550a224f4218e68306300cf9a532624ce72bbe4266330d9ae74d1bf77c93e592983ca38b424fd9f7c4fb5f51

    • C:\Users\Admin\AppData\Local\Temp\677826\N

      Filesize

      716KB

      MD5

      c82d57c04aad2bd54dfeed7cbfee8ecb

      SHA1

      c564cfca3bcc3a26128917c94ab4e44f9cd25bbe

      SHA256

      4e285732bd17a06ae4be71beaad8e5ce4dbd211f2888b4571d5d0c716764c767

      SHA512

      9d3102efb33d4b5a510d24d1b7f313c66cb502b6b7572ef2c10538d3b48b8d63d7cad41e5b9596181b142a7fdfd27727c6541a55307b4c4f793b957acd7ecedb

    • C:\Users\Admin\AppData\Local\Temp\Alcohol

      Filesize

      50KB

      MD5

      dd266093b6c3933b83753002fa856a2e

      SHA1

      39d54dc7d7dc9a7c7dd626046096730e730c22d4

      SHA256

      5fd8ed3bcc118a3e4da9669b07497f3933245fdf4451276394858022e8f867bb

      SHA512

      a6cab1788fbce3dc329f84b2cfe034d67ce909a0dcf871f22e51ad11e17a26201f894280568fa46c2dcffa74cd6e9be4287201617288a1c171dedf52f370b7c5

    • C:\Users\Admin\AppData\Local\Temp\Charged

      Filesize

      90KB

      MD5

      21a1caf7906cd79fa2f0c1ccb065c02f

      SHA1

      35d20fb034f3587773695fbe05fb0984be7cc12c

      SHA256

      0817e365a8a9bd66f18ebc955af76d00ea70071573952988e9701f5944b12ec8

      SHA512

      4952e631e2b98f19cd4952f8f4ca7b422025e6111678a3aee94197fd7e7b2f6da5c8761ce9a9f2ec909f184b9172275c11a21cb430b6d90171115005d5733e59

    • C:\Users\Admin\AppData\Local\Temp\Chief

      Filesize

      135KB

      MD5

      5d7f155185b7b7ce52433df0895cd254

      SHA1

      3dcf933c6895b843dba20447c21f673f83eafa9d

      SHA256

      eea2d5cfcf7311b8e926741ca23552d11d43049753bbb2efd835a6e7ca9fb396

      SHA512

      29a0603a0af8e8e0d9a8e8a414d91edcbf6e5236d8f4a1496ec84db26dcec2cfcae133bb33ae87ccbb6442f54abfe8ca450cf65515ec587bf551b583828a3318

    • C:\Users\Admin\AppData\Local\Temp\Controversy

      Filesize

      54KB

      MD5

      9ab6cc30c12ceb5d4f1bb3a55d4fe455

      SHA1

      74c250c42e24e6df717b49a4bed3729eb9064cad

      SHA256

      3a83e692c74855b6dc24c7067d4308031310a678e4c57ef45e7d3ec9256844a1

      SHA512

      c96341afa3630fa9212ff91d860cbfd37d135c52386a316c3b161bc0df307486d4bf19fb7023532ae26380643f010bd7427ba5ab3768ee3e3f6d4bdd09921144

    • C:\Users\Admin\AppData\Local\Temp\Corporate

      Filesize

      95KB

      MD5

      459740d3aa55d6bb677047a043a11049

      SHA1

      20002f1d45fea6eed6aff3ead22cff091d78b41a

      SHA256

      4c4f6ef591cdd3d235fe09df1a90cd5af14c756a908be132c13a9ede2b7a900d

      SHA512

      b51d14c8da04fff2ed8d309b643a91f679bf2a31638b8e91b7de9bb7cfe7f3aa8590432b685621b871a004de2d8aeafc0ccf057ae5f55bcb0661c7172105cb34

    • C:\Users\Admin\AppData\Local\Temp\Dealer

      Filesize

      51KB

      MD5

      9c9c85945089a8c81528a6b23a209e20

      SHA1

      599e249d010d0a40f3914d82af710c655a1da778

      SHA256

      71e8e4c78a2238179f1d01d2c280caf8cca1b62379c51fcea39fab2800990d5c

      SHA512

      26159ef952317a38560f91d10ccf89f9c652cfefc73a15681f3554f36ae53326322abb3466900466dbd0868971df7a9d1c2d718facfe87becd13b7390438e9f0

    • C:\Users\Admin\AppData\Local\Temp\Fig

      Filesize

      54KB

      MD5

      c7c08c021e27b2eeb0824937a10ac43d

      SHA1

      3ffec4974bccf5a2cb9ad02411dbad5b62f810a1

      SHA256

      4f6a15c2bc947318ba8bccf9be0948bccb6740d1f06ccd5ecf9296609166e524

      SHA512

      0b539d2800c0ff28841f478368838b12cee02019145275432cc7fd9767bced34f444d1c77c50804da36e00942fb19ac0ac65c73918d7f2e96ef77eba28387d14

    • C:\Users\Admin\AppData\Local\Temp\Hearings

      Filesize

      115KB

      MD5

      1d1169e8e8c0de7a5e7e1babd8470dd6

      SHA1

      4406eb665fc118b1767464f0ce2484c97eb4880b

      SHA256

      f20431c1d82ab151dde7271cd37a6f208fcd45272d9a83980ccc3dd72d704f40

      SHA512

      4e7562f6102f1265bf5c64509adc68769680110bfdd2333c977a3404cea3d014960ef1be276bff241761c9e5135711d2dba53980e5bb6ea83375e1951eccd351

    • C:\Users\Admin\AppData\Local\Temp\Larger

      Filesize

      143KB

      MD5

      39c723a69e6f51230d209b72f81abe9b

      SHA1

      b0f058579d60e5a6c612f60732fdf3d7c8e86a9c

      SHA256

      4a1b5ff59395fc0991987b588918649871a3106340a3d6f572c3fa232d59fbc9

      SHA512

      04858b44c1db4b307f0fb2c853ffb0c1149a23166c670aaa407d191ab47ce21702858d4b30aabddec253652868e19b1a01acf1e2a5ab776581e191ca38f8806b

    • C:\Users\Admin\AppData\Local\Temp\Lets

      Filesize

      69KB

      MD5

      fa2010085679eec632f3107657e30a81

      SHA1

      74611be98ea26266232dd5a92f465d09273f76f6

      SHA256

      b449025fe3c3a0598c9d9bcf2d8c631fba1b3c4144237d78fe6ecdd1574e2211

      SHA512

      5d2346b043f37469be69690da25b4257d8554a24b48214dc91e5957971184e56db49aecd1cd2379d27ba0e31e1f31bef07d974066ad5c92b95caa16811126ca5

    • C:\Users\Admin\AppData\Local\Temp\Market

      Filesize

      29KB

      MD5

      971cb890ac9f35b6105de0eb33095730

      SHA1

      d113b90f9219237a611a8ee03040682ddbd93ce1

      SHA256

      ccf66550ac0bbd65aeffeffc0756f2e0669a88528f598350841cb68a6e48fba4

      SHA512

      8cfaba88e6b9d55676a454f290a1cbb112624f6986ca441f48ae93f9132810d03337f42371ba3d5116b92b8bd1a5d12047d0139a9ef1700d6126fee8bc70829e

    • C:\Users\Admin\AppData\Local\Temp\Matter

      Filesize

      45KB

      MD5

      d4b3adc8cbb57eab0bf606db6a43e118

      SHA1

      356174d53e6491026eb1ac8ebcef4cf718bce17b

      SHA256

      85acb62961bffd09d7b492ce0f6d127e67a80e874bd66f3e50bb02b4bbbf6e16

      SHA512

      ead4144ce24f579c7f0e5055620257674d907f5bbd3a65868847421675985c7d81422d9076f2fbd901cec6835c81035d464916d8e94a0ce3c9c8014c0c3dfd01

    • C:\Users\Admin\AppData\Local\Temp\Metallic

      Filesize

      148KB

      MD5

      acac13dc82ce749f727f0c81ba5fdc73

      SHA1

      5350fe77594467906a5251b8c2248cd81d15d8e2

      SHA256

      b6a35ac20baed2784e793e577670b5ae1062890cb9bc4d931a9f0bc874b2a612

      SHA512

      c86b8dd695dae4626631af41497c73250a73967e28a9f3472f2d344c4ff2f7fbaf9101fbd5ec45124537df823951c5e09fe0696488ad599d6afa77ddb918364f

    • C:\Users\Admin\AppData\Local\Temp\Peripheral

      Filesize

      71KB

      MD5

      2c4cfd8a5b0e70b3b8e872fc1091c9ca

      SHA1

      2c6c8dc12ca41da972d3b393129506c9b9cba0cd

      SHA256

      e7051ec0a2700737d0c85441ef433d0041451623346d2933f4ad602c88c83bde

      SHA512

      19e74e8777d5fb850cecf1e95219f7ebc8648c29a24647b72ce94a5e1286ca3fcffa9fd8ad19f689b1a3466a109dafba2d10dbc85fdc1610fc0716ce4018174e

    • C:\Users\Admin\AppData\Local\Temp\Phentermine

      Filesize

      67KB

      MD5

      49efdfc03ccda219825c385b3b35fb43

      SHA1

      cb1b3e7c95e0c457de0a8879073301b44a12fa3a

      SHA256

      f98c5bcc2a2a7abdc448a2c048326aed45a9a914a2ab3ea4d1ba4ada7d810144

      SHA512

      560fe3ee3f80850eb5d6813327d165af384b31691d35694c4e4385f5b0bb895747042d97d4f63c9fa611aca0a642924cf9dead30ec035eee62a87fddbcd1b8f4

    • C:\Users\Admin\AppData\Local\Temp\Presidential

      Filesize

      36KB

      MD5

      54c230191c78cf10807f0d4eaa561cbf

      SHA1

      70a2b2019668f5bb8c3d58c64eeb34c9907b55e6

      SHA256

      a656398863a57ca942f748b9a697de3217c0e1843679d1e8d6c8ac98f8c1e02a

      SHA512

      3f195d1212295be976285df384612f26e174e1f2de679b209ef8861999e430de13ea6e3dec8747f4ddf227f44dfeb2a6112d137cb208572c5ef9b4f2d42502df

    • C:\Users\Admin\AppData\Local\Temp\Query

      Filesize

      76KB

      MD5

      e5f5603745ac7e491627f61f770384e1

      SHA1

      71b49644f3c8659c075cfa4cfddba22588131fb1

      SHA256

      9706522d1d008fe36cc3d7bb32a3c33b18530ba86a7e5e557b0d95ece20be281

      SHA512

      6d84b641c97bf6dd3c075eb59803d97483e3167d1d72871be14b1f9519751d6a74ac973bf9e50d5a3d5a7b954dc939a8063dd91ea1123581170053c48d9c5237

    • C:\Users\Admin\AppData\Local\Temp\Syndicate

      Filesize

      87KB

      MD5

      5ebb42aded1c56715ba1ec98bc2638f1

      SHA1

      9b3ad86be972bc59ecf45c249fd38a4dfd762fff

      SHA256

      d302b56f0fabfb24855d94c90bbdd829837b8fa85b1c6777cf2e20b5526bb602

      SHA512

      256645ac47fe31aa2147906bc5a53ba328f288e20d44adcd0adff9e386dddf63a8c9a161d675f35e56443985a6d811f0fed2f48c526a17c0923b6653d4ee2ca5

    • C:\Users\Admin\AppData\Local\Temp\Usgs

      Filesize

      74KB

      MD5

      86bdddbf60a6b1ce21d695171b5b50a7

      SHA1

      3edcc074129f105db4ead779d08be20d6812ee15

      SHA256

      a3a5647bb284f7f395407a00d9efaeacf0d54c8e79fba8bc28fe826183f24eaa

      SHA512

      26657048694fb307e80bbe91964bf4dfebafd0729669cd9f2290c7e139ec1ce21c3410ceba3b7c2f0ce3a4dbf57bfb62248670dc9cb9ccce3baf1096e484c27d

    • C:\Users\Admin\AppData\Local\Temp\Veterans

      Filesize

      127KB

      MD5

      5cd6af8d1d071c54d081df22f7d057ab

      SHA1

      330782e2fceb552e894643fdc40affadd187044e

      SHA256

      bcfbf03bfe8181b81f3a1ff2d3774233ce013596fb3f4f535819fc422b696cee

      SHA512

      4f6cb5f41f5d338b998a075c532eb500806463c14fb9ab0b3945ca5aa24cc2ddd12f3d0e02d91fef513aa3602a9e29cf69abbe12181ba625dfc7f0e325f3d6f7

    • C:\Users\Admin\AppData\Local\Temp\Viewed

      Filesize

      54KB

      MD5

      01e51a0d2ac4e232bb483444ec14f156

      SHA1

      8db19310817378bcf4f59f7e6e8ac65e3bad8e2f

      SHA256

      27d2e36b97dba2657d797098d919f7c76893713537ff4aba5f38cb48bc542ef9

      SHA512

      c982a98ae76f1dc6459f868c9f7b79d9cd3372c2045fd10fa1a876ec03367f77e4be9ccd27bbeaeb58e8c3c06e838a7de44057069f8cf1e7925cea14397e0962

    • \Users\Admin\AppData\Local\Temp\677826\Prostores.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • memory/2472-675-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-687-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-674-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-676-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-671-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-677-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-680-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-681-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-686-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-673-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-672-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-692-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-693-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-699-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-700-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-705-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-706-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-711-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB

    • memory/2472-713-0x0000000003D00000-0x0000000003D7F000-memory.dmp

      Filesize

      508KB