Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2025, 18:54

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    5.9MB

  • MD5

    6131056fc892f54be98187bc3dcc8fd7

  • SHA1

    7259142c131adefc47669a0ffbaadf829f1c388b

  • SHA256

    86ac5604218fbaca988fece976562fd2d0773a05a3763de028ad00e2052d7a79

  • SHA512

    2cff946df2e119e36fb88af140919b1fd2c5cb935c832bee81345f8298a931520d4994bd7d575efc690aaec388ac2f9d32dc4267456338e9902652c956d57dff

  • SSDEEP

    98304:hRMYywt7SVeoVdS6prkT7yO62mH24umHbnvNBqLS6c4ft3xvQEtLTleUv7wXm:vhea+OEZumHzvbyS6c41NLtLTkUUXm

Malware Config

Extracted

Family

remcos

Botnet

DICIEMBRE 02 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    ropcolr

  • mouse_option

    false

  • mutex

    vestuarjio-9BG9B0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 8 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2144
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CD29A63E3D3D4DD842F223B6DE3D84EA C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{306C37A2-3E8E-4FC6-8AF4-E8DEF9FF637B}
        3⤵
        • Executes dropped EXE
        PID:1376
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A704DB4E-25FD-4204-BA47-8C1B216B36A4}
        3⤵
        • Executes dropped EXE
        PID:3528
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{601C205E-544C-42E9-B9F3-31B4CDC46751}
        3⤵
        • Executes dropped EXE
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6635E782-8F62-4674-B1BB-6D51F09D9926}
        3⤵
        • Executes dropped EXE
        PID:1980
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4FCB6D32-5A00-4E5A-AB50-CF40B511E72B}
        3⤵
        • Executes dropped EXE
        PID:2608
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6F2DB58F-0C88-40D6-8261-CA9DD9A0F8D0}
        3⤵
        • Executes dropped EXE
        PID:1984
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7FB748C4-EE80-4AA8-ABB7-1616F570B185}
        3⤵
        • Executes dropped EXE
        PID:4968
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{581A7168-97F4-4D6C-9A3E-36D4BE9B3546}
        3⤵
        • Executes dropped EXE
        PID:3732
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B2F95412-F99F-42F5-A2AB-38B5DC09851E}
        3⤵
        • Executes dropped EXE
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5ED86348-9B00-4A92-83CD-3C37FCE176DF}
        3⤵
        • Executes dropped EXE
        PID:3932
      • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\Dashboard.exe
        C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\Dashboard.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Users\Admin\AppData\Roaming\EC_Power\Dashboard.exe
          C:\Users\Admin\AppData\Roaming\EC_Power\Dashboard.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3628
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\Users\Admin\AppData\Local\Temp\Rctool.exe
              C:\Users\Admin\AppData\Local\Temp\Rctool.exe
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ropcolr\logs.dat

    Filesize

    144B

    MD5

    54b8ea6fe92dbed1378b644fa39d5b44

    SHA1

    3a70ee6a91f4e244d4d5a35768d6684d53df9e79

    SHA256

    17a290c7bbe994ab88eafd28846224183626b8ef84b655c576319aa7dd9d4608

    SHA512

    8253d17246ba78da7fe48c144c888a751da3ef0bd844723256c8efad3b1ea23b130febc7d8c42ee26e23b906746dac1916697006ba72cdfa4330a28d22cee019

  • C:\Users\Admin\AppData\Local\Temp\670b797e

    Filesize

    1.6MB

    MD5

    847ddcf9eb6c5fbf5841dab3dd83eaa6

    SHA1

    8f54b231bfa464fe92c21c2b7d551af93fc20854

    SHA256

    a80210a751822addc47602f04862c808fa55ff62f90a5f877455e4560bcbef30

    SHA512

    2eb551a43d106e8c3a77bcd819aefff9e8610909c55cbcd7d9625af3f4cacf40d305e1e8f761e5aceb09c2417eafd874934c1a7b57e3f3e5af8d6816a5bdf8a9

  • C:\Users\Admin\AppData\Local\Temp\MSI9FF9.tmp

    Filesize

    171KB

    MD5

    a0e940a3d3c1523416675125e3b0c07e

    SHA1

    2e29eeba6da9a4023bc8071158feee3b0277fd1b

    SHA256

    b8fa7aa425e4084ea3721780a13d11e08b8d53d1c5414b73f22faeca1bfd314f

    SHA512

    736ea06824388372aeef1938c6b11e66f4595e0b0589d7b4a87ff4abbabe52e82dff64d916293eab47aa869cf372ced2c66755dd8a8471b2ab0d3a37ba91d0b2

  • C:\Users\Admin\AppData\Local\Temp\MSIA142.tmp

    Filesize

    2.5MB

    MD5

    0b63cdc283400d0f32f20c0be6cf3029

    SHA1

    b1b6ce7d50ad4f2960687af45db60048a3d78549

    SHA256

    67fc63b08a4c9b7957d5e59781bcf42fc65a0d86c9cbfc3b492ad36e11388259

    SHA512

    ba85b5617068b24f03b88b159565f1bffb9d4182668ba2d076076f5fb425501bd38bd0544d8eef38e910f22b25b521304bf2731adcd8836bc09b444e00300963

  • C:\Users\Admin\AppData\Local\Temp\Rctool.exe

    Filesize

    433KB

    MD5

    fea067901f48a5f1faf7ca3b373f1a8f

    SHA1

    e8abe0deb87de9fe3bb3a611234584e9a9b17cce

    SHA256

    bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

    SHA512

    07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

  • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\ISRT.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{1B5F098C-6635-496F-9FFC-D3BEF0D0DCFF}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\Dashboard.exe

    Filesize

    141KB

    MD5

    704925ecfdb24ef81190b82de0e5453c

    SHA1

    1128b3063180419893615ca73ad4f9dd51ebeac6

    SHA256

    8cc871ee8760a4658189528b4a5d8afe9824f6a13faaf1fe7eb56f2a3ad2d04e

    SHA512

    ca187015812ddfcaa6515f3a5b780183b4a772801aa14b3f785d6dee9b9aa7db6402a7b346623fd24cf4a28f9856683022b10c3d812f8f2888e25bb218cbf216

  • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\UXCore.dll

    Filesize

    811KB

    MD5

    1025cdceeaa24a62b68db75e8e8149be

    SHA1

    e46c54cbd90e1099db8369737eb493602ecf6879

    SHA256

    4e848d1ba16a151b59771175c3672e5a538d42072ff72f7116103f0220fe2814

    SHA512

    3468d9605d7a898a1769b7da278765521103af082bf07a3aff2ba16acd90c8e6958a08f22880fe52af365786475094613c60caed592bc9a81f7dcaac86581d74

  • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\msvcr80.dll

    Filesize

    612KB

    MD5

    43143abb001d4211fab627c136124a44

    SHA1

    edb99760ae04bfe68aaacf34eb0287a3c10ec885

    SHA256

    cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

    SHA512

    ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

  • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\pdw

    Filesize

    66KB

    MD5

    69fc81307b3e73b0873829cd094a41b4

    SHA1

    5a4249e58529b74123cefc4e0ee5a7578f3e1bf6

    SHA256

    0bcda1e18457ef4088ab7500a5741bf490f7b631fe251bdba15aa32939f71353

    SHA512

    6052433cb3621d087a390af6dc29d749f7f193161c7fb4ed643009ac95e919e70fb3cd3be4a9521311e101fd05868f6c0c367797340112156c533d01477c9c24

  • C:\Users\Admin\AppData\Local\Temp\{A13AAEFF-AFD5-45EB-BC3A-BABECFFF07BE}\uhp

    Filesize

    1.1MB

    MD5

    32569e9ac948389871dd74f0be3bba1c

    SHA1

    c98efd1a7a727ab2560221401d6a8c23636eaee7

    SHA256

    fa1b1cfdd06dda86a4b5f78823c72c1ec37d8a76e01c61728d049355d37499e0

    SHA512

    a7364d33c990b1156ce38664e5b04567f0bb9e8ca6f8b25f9c4868f3485770ef9c30908b70e3151995d112271738f1a4caa4a86cb37da09046dc4498e5008654

  • memory/848-38-0x0000000003880000-0x0000000003A47000-memory.dmp

    Filesize

    1.8MB

  • memory/848-33-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/2440-85-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

    Filesize

    2.0MB

  • memory/2440-86-0x0000000074BC0000-0x0000000074D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-89-0x0000000074BC0000-0x0000000074D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3488-100-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-103-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-124-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-121-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-96-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-97-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-127-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-118-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-130-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-106-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-109-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-112-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3488-115-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3628-80-0x0000000074BC0000-0x0000000074D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3628-82-0x0000000074BC0000-0x0000000074D3B000-memory.dmp

    Filesize

    1.5MB

  • memory/3628-81-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-66-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

    Filesize

    2.0MB

  • memory/4184-65-0x0000000074E90000-0x000000007500B000-memory.dmp

    Filesize

    1.5MB