Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17/01/2025, 18:55

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    5.1MB

  • MD5

    b0b0ce5887fe4e050976eb7b6dcca652

  • SHA1

    f1b214aa8d48ed152dfe93e897b871751363f0c2

  • SHA256

    8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3

  • SHA512

    611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40

  • SSDEEP

    98304:6ZR9azHni3R3ousBqztSdq0doM+a76WmUydgul2bajywVmBTfnCAwvnZJ:6ZnaiG3Bq5UPRrul4imRnClv

Malware Config

Extracted

Family

remcos

Botnet

NOVIEMBRE 13 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vlitanhs

  • mouse_option

    false

  • mutex

    necoclior-AOS1YP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2688
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:4
      2⤵
        PID:2244
      • C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe
        "C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3924
        • C:\Users\Admin\AppData\Roaming\Authload_2\Mp3tag.exe
          C:\Users\Admin\AppData\Roaming\Authload_2\Mp3tag.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3736
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4984
            • C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe
              C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3404
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e578a9d.rbs

      Filesize

      8KB

      MD5

      e7e0c67643cbd48086e9d1ddea73da8f

      SHA1

      86c4240bf670379d209745c0e1773007f196d56f

      SHA256

      6f7841257ad7b041e7a8493875453a4ffc9b8c1970c0587d8e1eaf442b627753

      SHA512

      1d0efe617dcd93e1ee168e4607b71a38834c613f2e883083fca4a251d8e9622193c50503561b4365fced9df13f5ef9c96a8f1e8afec6ecff86bba86b902a4068

    • C:\ProgramData\vlitanhs\logs.dat

      Filesize

      144B

      MD5

      c49cbf7985236a89f7fae38380a08f3e

      SHA1

      35ef21478171d4aa988f297429568c94f9abef99

      SHA256

      770614b3dc3cf45685e1a40f9a78598729fd64eae0d7fb32ecde542ba8ebc7b7

      SHA512

      180150668a7e36a59bf460fd91cb7b7d79e685c60766c0947442dea70e5b7a5a1dcd73abbc49273de4b42128d020598557060765cfe709a63cd7bebdeb8fa328

    • C:\Users\Admin\AppData\Local\Temp\39bd9d0d

      Filesize

      1.6MB

      MD5

      11f8583a9f17ef9ed05d8c4ce862f230

      SHA1

      0181b29c81325159a012819585cedbcd971e0ee7

      SHA256

      46ae65c480a19e60a5ef93e7cb340d95de806d9a62aeb7e8668cafa917495537

      SHA512

      2a1082d432162cc4171ab1585ee1f744027f1f937639a4dea4b0373f0a983ebd45ba8ba825c8eec01e05c1756c7c713de91e115a315fefdec5386e8e2469dc57

    • C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe

      Filesize

      12.0MB

      MD5

      a7118dffeac3772076f1a39a364d608d

      SHA1

      6b984d9446f23579e154ec47437b9cf820fd6b67

      SHA256

      f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0

      SHA512

      f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890

    • C:\Users\Admin\AppData\Local\Temp\Kerb\ctmtfu

      Filesize

      1.1MB

      MD5

      b7626f9bde903c0bbb5cd1591433e1ce

      SHA1

      487adcc0ee7f4ee88ebb7d49a5281cb02636d350

      SHA256

      2d345940b1eedbc610f38c240f2295543536131c94a155d1f4262278fc25d2a4

      SHA512

      176711122486190252e263902a4786b3c8d368c8e3c9ad76ff7605654dbee0aa35d513779c39d51ea455cb5f65d4ce08602cff8d8dcab476a3d1d644851a0c7c

    • C:\Users\Admin\AppData\Local\Temp\Kerb\dprsbc

      Filesize

      16KB

      MD5

      8676b6f972be116e4031801380b253fd

      SHA1

      d2401aa086f7c1d6ba1771426584de52b8c34bbc

      SHA256

      e16559555888a2d450b17f7bb998c38295bd603138431a346ad3de7dbde88246

      SHA512

      dcf8bfe59cdcb11b25ec7e739e4ca2b1270bf8805ceed14f2fb506dd9fc01df8c766c025b3adde18b13c76f1a699fad21976df417b08c49c69593f229b0e27bc

    • C:\Users\Admin\AppData\Local\Temp\Kerb\tak_deco_lib.dll

      Filesize

      315KB

      MD5

      4dd5f2fb7782a1b8400db7c005c45c7b

      SHA1

      605e679e5a9c4b6324dfa992b60514dcbb5186b8

      SHA256

      dfd7da942d4e5ae820f788f56eeca312c916c5c3478e4cd898c1c19b3431991f

      SHA512

      78bedf7c602aa7618342e50e2659cc9615beb39b6782ffc4697848a08f0c1c696e4f1f7b4fecdcb51e07f9a6e93b448bca0b4cefe60817a141f68ae6c13840d1

    • C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe

      Filesize

      433KB

      MD5

      fea067901f48a5f1faf7ca3b373f1a8f

      SHA1

      e8abe0deb87de9fe3bb3a611234584e9a9b17cce

      SHA256

      bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

      SHA512

      07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

    • C:\Windows\Installer\e578a9c.msi

      Filesize

      5.1MB

      MD5

      b0b0ce5887fe4e050976eb7b6dcca652

      SHA1

      f1b214aa8d48ed152dfe93e897b871751363f0c2

      SHA256

      8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3

      SHA512

      611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.9MB

      MD5

      78f1ab1aa7cdd07a0ed08747610387e7

      SHA1

      27fa0fd21fae5c287a5baac813f54d51a9f42b18

      SHA256

      faab1e196155045e5b99f7aa3caa538200297fbe51e8aa379910f2fd86095066

      SHA512

      284d5c7f324f3fa428d8630c7579507b534bdc6bf025559abd4eb1c240a1974fb7de15bb7daaff84b7d3dd3497a728f50e165a2b0b578623d917354f2fb41495

    • \??\Volume{1cd1de57-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a58a0e81-8ecb-4ac2-92ea-99de8af9a813}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      21c77201d69046b9405eb97d50e52342

      SHA1

      839856268b7c083cbbe380116315721fa6d89e7e

      SHA256

      f4bc86024acc07c6c693ee4e82a93263afc7e47d15630fe16e23657fc98cc523

      SHA512

      2096b3d823335ed6ad7c7c5a6616c023c342d3829e9df412da4ef622f64537a97a4883a69e5f39e2badcf1eb1f4f1404c74b360f748fc1be58f95f0be0b89eaf

    • memory/3404-74-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-77-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-92-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-89-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-86-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-83-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-80-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-71-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-68-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-58-0x00007FF953550000-0x00007FF953748000-memory.dmp

      Filesize

      2.0MB

    • memory/3404-59-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3404-62-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/3736-42-0x00007FF934340000-0x00007FF9344B2000-memory.dmp

      Filesize

      1.4MB

    • memory/3736-41-0x00000000004D0000-0x000000000052E000-memory.dmp

      Filesize

      376KB

    • memory/3736-45-0x00000000004D0000-0x000000000052E000-memory.dmp

      Filesize

      376KB

    • memory/3736-43-0x00007FF934340000-0x00007FF9344B2000-memory.dmp

      Filesize

      1.4MB

    • memory/3924-37-0x0000000000810000-0x000000000086E000-memory.dmp

      Filesize

      376KB

    • memory/3924-35-0x00007FF934340000-0x00007FF9344B2000-memory.dmp

      Filesize

      1.4MB

    • memory/3924-31-0x0000000000810000-0x000000000086E000-memory.dmp

      Filesize

      376KB

    • memory/4984-51-0x00000000750E0000-0x000000007525B000-memory.dmp

      Filesize

      1.5MB

    • memory/4984-48-0x00000000750E0000-0x000000007525B000-memory.dmp

      Filesize

      1.5MB

    • memory/4984-47-0x00007FF953550000-0x00007FF953748000-memory.dmp

      Filesize

      2.0MB