Overview
overview
10Static
static
3toolSync_v...or.asp
windows7-x64
3toolSync_v...or.asp
windows10-2004-x64
3toolSync_v...or.asp
windows11-21h2-x64
3toolSync_v...rd.jpg
windows7-x64
3toolSync_v...rd.jpg
windows10-2004-x64
3toolSync_v...rd.jpg
windows11-21h2-x64
3toolSync_v...rl.exe
windows7-x64
10toolSync_v...rl.exe
windows10-2004-x64
10toolSync_v...rl.exe
windows11-21h2-x64
10toolSync_v...32.dll
windows7-x64
3toolSync_v...32.dll
windows10-2004-x64
3toolSync_v...32.dll
windows11-21h2-x64
3toolSync_v...32.dll
windows7-x64
3toolSync_v...32.dll
windows10-2004-x64
3toolSync_v...32.dll
windows11-21h2-x64
3toolSync_v1/unrar.dll
windows7-x64
3toolSync_v1/unrar.dll
windows10-2004-x64
3toolSync_v1/unrar.dll
windows11-21h2-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 12:38
Static task
static1
Behavioral task
behavioral1
Sample
toolSync_v1/agitator.asp
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
toolSync_v1/agitator.asp
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
toolSync_v1/agitator.asp
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
toolSync_v1/buzzard.jpg
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
toolSync_v1/buzzard.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
toolSync_v1/buzzard.jpg
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
toolSync_v1/madHcCtrl.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
toolSync_v1/madHcCtrl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
toolSync_v1/madHcCtrl.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
toolSync_v1/madHcNet32.dll
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
toolSync_v1/madHcNet32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
toolSync_v1/madHcNet32.dll
Resource
win11-20241023-en
Behavioral task
behavioral13
Sample
toolSync_v1/mvrSettings32.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
toolSync_v1/mvrSettings32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
toolSync_v1/mvrSettings32.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
toolSync_v1/unrar.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
toolSync_v1/unrar.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
toolSync_v1/unrar.dll
Resource
win11-20241007-en
General
-
Target
toolSync_v1/madHcCtrl.exe
-
Size
3.1MB
-
MD5
b841d408448f2a07f308ced1589e7673
-
SHA1
f5b5095c0ed69d42110df6d39810d12b1fa32a1e
-
SHA256
69a90665113bd73b30360d87f7f6ed2c789a90a67f3b6e86474e21273a64f699
-
SHA512
a689734048109ab7bec9491bbb7781686c19c7885166b3ca2975e2f49e956fcc388cd8ca85a4e5a8bf9efe6056f1e0d80197b7f521d4f0d4cadb10ba9ef1fa93
-
SSDEEP
49152:pvFg5qg9BtIAHE3SM4ahx6LK2SamuZob+tCjNrv8:Jm5qGBHBLRKuZfkjNrv8
Malware Config
Extracted
remcos
5005
92.255.85.63:5005
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6TENMT
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 2260 2524 madHcCtrl.exe 31 -
Executes dropped EXE 1 IoCs
pid Process 2524 madHcCtrl.exe -
Loads dropped DLL 5 IoCs
pid Process 3056 madHcCtrl.exe 3056 madHcCtrl.exe 2524 madHcCtrl.exe 2524 madHcCtrl.exe 2524 madHcCtrl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language madHcCtrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language madHcCtrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3056 madHcCtrl.exe 2524 madHcCtrl.exe 2524 madHcCtrl.exe 2260 cmd.exe 2260 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2524 madHcCtrl.exe 2260 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2524 3056 madHcCtrl.exe 30 PID 3056 wrote to memory of 2524 3056 madHcCtrl.exe 30 PID 3056 wrote to memory of 2524 3056 madHcCtrl.exe 30 PID 3056 wrote to memory of 2524 3056 madHcCtrl.exe 30 PID 2524 wrote to memory of 2260 2524 madHcCtrl.exe 31 PID 2524 wrote to memory of 2260 2524 madHcCtrl.exe 31 PID 2524 wrote to memory of 2260 2524 madHcCtrl.exe 31 PID 2524 wrote to memory of 2260 2524 madHcCtrl.exe 31 PID 2524 wrote to memory of 2260 2524 madHcCtrl.exe 31 PID 2260 wrote to memory of 1908 2260 cmd.exe 34 PID 2260 wrote to memory of 1908 2260 cmd.exe 34 PID 2260 wrote to memory of 1908 2260 cmd.exe 34 PID 2260 wrote to memory of 1908 2260 cmd.exe 34 PID 2260 wrote to memory of 1908 2260 cmd.exe 34 PID 2260 wrote to memory of 1908 2260 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolSync_v1\madHcCtrl.exe"C:\Users\Admin\AppData\Local\Temp\toolSync_v1\madHcCtrl.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\toolSync_v1\madHcCtrl.exeC:\Users\Admin\AppData\Roaming\toolSync_v1\madHcCtrl.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5841159cbfe47769bfa95d4127790146b
SHA17d8560c0e6f369a282c0d445f3a5270a9ccb9bb8
SHA256ee6dd6bacbd1754631e43a1f5b1f8f9e8e162b563ee60d861de9587b90fbef22
SHA512dd94f8a25482a0ff6de3d449e8a356c30452eb3438f2595572f1be50b51f91a52274402571946d04af01fa7661091bed0db95ee390c5ff6908eeb8370ad60d27
-
Filesize
947KB
MD5f235ee7a69eb63d209526641e146fbfb
SHA1a93ae672d8b21f0cac0652c5ed1b098ffa791b77
SHA256bf2203ae2b727f3c4f63a46ab9d5beac1189de6b9d4db641b5965c1027596337
SHA51256d851567016419274e93a35dce2c8d8807f07530e9248c9b3c30be5ee0fb5f39e935ccff653d16a360866f8b4aff59a07070dcf19202f59ad722a0f53e0c1de
-
Filesize
56KB
MD5b5b479dd84c8465723f62d9bfa890a8e
SHA1ade400a8ccb15678705b269862acf350a61c58b4
SHA256dafeebfa6e92322d2966652d1950dee45d686f3b13051ef889a67e7014906136
SHA5124384800fd6868efaf0e4f5a4796efebb4c6264ccd42e60a256e73fa9fec0724ef796b8030ee897f699927af67e83e0e40350e461cb3d69f102536291faf18ae5
-
Filesize
894KB
MD5041d41db569d4bbe764df2586205027e
SHA1ea36c581a456fa55694df4a0748ca6e3795dca2b
SHA25676dd9f6acbd1104458bcfc216c32e4f8d4de7ae63bbaf01412bd9aa545c4ed59
SHA512661dea5145d31ce15fae23a1c2c4591e743a8528bd4eac6a426bf7fad12b4d2aaea01d69d71fbdadbc8d45d4485e94df1f68af1c5a489cf92893c54f2fe6cd83
-
Filesize
1.0MB
MD5d168f18b79f9f33690f011d1deb1e7cf
SHA1cf0d984ce101ec274e65e88fae07daeb26de5a6d
SHA256b7d3bc460a17e1b43c9ff09786e44ea4033710538bdb539400b55e5b80d0b338
SHA512bbf085bcbc3c1c98caba95bdf48051bac18bbd1b7314c7bb55b56e3d423fb34758cc239c237091486cc466123bf02844eaac3b4435cb535af25dc2bca625af71
-
Filesize
3.1MB
MD5b841d408448f2a07f308ced1589e7673
SHA1f5b5095c0ed69d42110df6d39810d12b1fa32a1e
SHA25669a90665113bd73b30360d87f7f6ed2c789a90a67f3b6e86474e21273a64f699
SHA512a689734048109ab7bec9491bbb7781686c19c7885166b3ca2975e2f49e956fcc388cd8ca85a4e5a8bf9efe6056f1e0d80197b7f521d4f0d4cadb10ba9ef1fa93
-
Filesize
304KB
MD5851c9e8ce9f94457cc36b66678f52494
SHA140abd38c4843ce33052916904c86df8aab1f1713
SHA2560891edb0cc1c0208af2e4bc65d6b5a7160642f89fd4b4dc321f79d2b5dfc2dcc
SHA512cdf62a7f7bb7a6d511555c492932e9bcf18183c64d4107cd836de1741f41ac304bd6ed553fd868b442eaf5da33198e4900e670cd5ae180d534d2bd56b42d6664