Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17-01-2025 18:56

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    9.4MB

  • MD5

    e08f4ef0a8695fb151e2af8e54bd2344

  • SHA1

    a399a4c848148af77f9f75ec4e8d3688009ba2cf

  • SHA256

    702675900bbfaca101c29391fc497066b5649c123f41383a69562a886efd1112

  • SHA512

    6a3fe318de56195912563fdb2516a1f7f9ffec3a03043e6131a93a89eb45d5aff526b23d82e005894a316bd07d70295c49f893932d6d20dee44f5cf054f3d23a

  • SSDEEP

    196608:fS904j9o9QA4SH3cKSXf4eOrIZ9bnF/dMT5zLy45TH7xtino:i04RoDNH3cKSP4eOriJF1MFzLyybxt

Malware Config

Extracted

Family

remcos

Botnet

OCTUBRE 31 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    elecvac

  • mouse_option

    false

  • mutex

    prointerca-JFYAH7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 26 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:4
      2⤵
        PID:1784
      • C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe
        "C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Users\Admin\AppData\Roaming\ComBrowserinl\PasswordChanger.exe
          C:\Users\Admin\AppData\Roaming\ComBrowserinl\PasswordChanger.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:5068
            • C:\Users\Admin\AppData\Local\Temp\validCtrl.exe
              C:\Users\Admin\AppData\Local\Temp\validCtrl.exe
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2704
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3300

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e579c70.rbs

      Filesize

      9KB

      MD5

      bbf0e966bfd2fe9c0d339960477d4efd

      SHA1

      0465e78a07c65ba98f871b8153b756c4492fd1c1

      SHA256

      28e74fd7a4e829dec1bc40abada7691814a8ce9e1aab382fd88b4e3e7a036a47

      SHA512

      d1b967f5205c27497e047e8c200d860119e5dc819b6420a9132ff7277a3c197fd4dfa44a781fdf6b0e208ec09149546f149ef18bf7d01680d5024fe7c1578edc

    • C:\ProgramData\elecvac\logs.dat

      Filesize

      144B

      MD5

      48df6721d91fbbcccfcde4e076f96bc2

      SHA1

      ab3b25377146a621762a945d321a321d7047b8b4

      SHA256

      bf9b672740942ec42ca8b09c3c5b7e63361e25dfd9abf6d29abd673e2e0422f7

      SHA512

      248b3928c9f98303afc33aaa7b7844452c61349d7f6534c6d60ddc07b7ccaec4673871d38cc1ffe74c845409a5b24230377e8146c49d7a1b17287d5bd42b9a34

    • C:\Users\Admin\AppData\Local\Temp\4c286cd6

      Filesize

      1.6MB

      MD5

      bd6b5c2a4c9f675e71a770910a652890

      SHA1

      7aa170db295d1ba2e8d391bcfa389f5b7139b343

      SHA256

      566ec72bd129849133471f85e8c337ae56b7133f9de070446211ca1c2d7a82d5

      SHA512

      e4808512eb4edccd8fd40cd910711b7e2a7456f1edbdefdf6ea94d4174ea57e82f20453527034cd8b9298ad43b7848c458a2a493b57592ed5fc79f061d9da8e3

    • C:\Users\Admin\AppData\Local\Temp\validCtrl.exe

      Filesize

      433KB

      MD5

      fea067901f48a5f1faf7ca3b373f1a8f

      SHA1

      e8abe0deb87de9fe3bb3a611234584e9a9b17cce

      SHA256

      bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

      SHA512

      07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

    • C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe

      Filesize

      2.7MB

      MD5

      8915b9ccb4372a418729166dcedc5a44

      SHA1

      8f6ca11bcb5a53fe90007ec83b638b0c642d2a92

      SHA256

      6f7f390b2012e7dfef9fcbd673a4a0256e2e217b11831e9a27a9d460ba57c0d2

      SHA512

      fd7bd3a8d3a8331d4fdd331a41dc1b3efcdbb29062a8d316cf07edccc05e7eb81153f01ec95df68f9d1466ecee0be49684737f6cf895fe6e55ccf163f1058e66

    • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Core.dll

      Filesize

      5.8MB

      MD5

      afa545d4093e02bf92599fd19639c2d4

      SHA1

      8de6846f2f2dd1f24fafce597193d71d12d52666

      SHA256

      6da23d106b1acf03fff55667efa5bd9f12cd1d608d6b0627dddd64a4ab34ca99

      SHA512

      318d5e144c328df50ae4708dd506d2c7240a94e723fa4beeb0e2a63726ff1801765ac0f0380776aeec2e6c0fb48929f399c61ce14a19ff152cb83347b038bdb1

    • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Gui.dll

      Filesize

      6.2MB

      MD5

      34893cb3d9a2250f0edecd68aedb72c7

      SHA1

      37161412df2c1313a54749fe6f33e4dbf41d128a

      SHA256

      ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

      SHA512

      484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

    • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Network.dll

      Filesize

      1.3MB

      MD5

      fe5ed4c5da03077f98c3efa91ecefd81

      SHA1

      e23e839ec0602662788f761ebe7dd4b39c018a7f

      SHA256

      d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

      SHA512

      22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

    • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5PrintSupport.dll

      Filesize

      316KB

      MD5

      d0634933db2745397a603d5976bee8e7

      SHA1

      ddec98433bcfec1d9e38557d803bc73e1ff883b6

      SHA256

      7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

      SHA512

      9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

    • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Widgets.dll

      Filesize

      5.3MB

      MD5

      c502bb8a4a7dc3724ab09292cd3c70d6

      SHA1

      ff44fddeec2d335ec0eaa861714b561f899675fd

      SHA256

      4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

      SHA512

      73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

    • C:\Users\Admin\AppData\Roaming\Leukemia\aeiyq

      Filesize

      29KB

      MD5

      da9135d38ad1bc95d770128afa7477fc

      SHA1

      3c64a33874159588736c39044050f4683da59f2d

      SHA256

      5f2ec637d706ead4ffa9191c0587812f7660b5ecad4de4ac5c5ea67b51e850a0

      SHA512

      d8a38c69d86d284a52bce9300c39f6a649a1dff83f20a9cc623624d79ef2e49ffd80897b43a5d5d3a2eaffac86777e535e7ddac5f4a5b564c27437c2f2f2f32c

    • C:\Users\Admin\AppData\Roaming\Leukemia\eisp

      Filesize

      1.1MB

      MD5

      e9015ad11b27fb4658df512dee18dec6

      SHA1

      cfc9f12da3e2000c261afc32aa9ba00567357547

      SHA256

      c41f840f049f420cc0eee1a9e88d5ee1d79d79e03ad41b4d64a6fc87974987ea

      SHA512

      b40f21603a5347a8992c2d3e367888d23b15bf3f0e224d85d4e703b44b6ed5812cb3cc51a73d139c6d2248fe1d993e075fe994237a0787a8d799845ab78e12e5

    • C:\Users\Admin\AppData\Roaming\Leukemia\msvcp140.dll

      Filesize

      557KB

      MD5

      7db24201efea565d930b7ec3306f4308

      SHA1

      880c8034b1655597d0eebe056719a6f79b60e03c

      SHA256

      72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

      SHA512

      bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

    • C:\Users\Admin\AppData\Roaming\Leukemia\vcruntime140.dll

      Filesize

      96KB

      MD5

      f12681a472b9dd04a812e16096514974

      SHA1

      6fd102eb3e0b0e6eef08118d71f28702d1a9067c

      SHA256

      d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

      SHA512

      7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

    • C:\Users\Admin\AppData\Roaming\Leukemia\vcruntime140_1.dll

      Filesize

      37KB

      MD5

      75e78e4bf561031d39f86143753400ff

      SHA1

      324c2a99e39f8992459495182677e91656a05206

      SHA256

      1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

      SHA512

      ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

    • C:\Windows\Installer\e579c6f.msi

      Filesize

      9.4MB

      MD5

      e08f4ef0a8695fb151e2af8e54bd2344

      SHA1

      a399a4c848148af77f9f75ec4e8d3688009ba2cf

      SHA256

      702675900bbfaca101c29391fc497066b5649c123f41383a69562a886efd1112

      SHA512

      6a3fe318de56195912563fdb2516a1f7f9ffec3a03043e6131a93a89eb45d5aff526b23d82e005894a316bd07d70295c49f893932d6d20dee44f5cf054f3d23a

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.9MB

      MD5

      afd09bbe2710ecc21497fd0292e8a765

      SHA1

      a86702da23f0ff2faa33d80b72ad3a24ac7ecb68

      SHA256

      fbbd3be4523217749423352366dc7811638285dda5bb773cd250f19d4c14ddde

      SHA512

      5ea23810b9459d2037f846b788616a53d8f6784967a98cae2057cf4b34fa56ec2cd4d45b91762de63363e16e7c1532b4e70fa32cd99ff1919739b2f78e69d5f7

    • \??\Volume{1f3febba-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{115e0a0b-b5a4-4949-89e1-273da48b39af}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      d5c62ae8497ddb66cae2941eb124af22

      SHA1

      527765ad40cd9c4c402375f9a82420df729ca16c

      SHA256

      6df24c8c5cdc50b7a9a25f02b20db70f1a69c2b26a3fa811f731e8d888ac6095

      SHA512

      a382dfa7b1c984ff952849d176f21f2a780b3ce0d85b24785753440fb9c7affec0728eb867c9ebf7e5a7faba3c783bc8d5f719fc841dff9587ca2c3e4dc5afba

    • memory/2308-76-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

      Filesize

      1.4MB

    • memory/2308-77-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

      Filesize

      1.4MB

    • memory/2308-75-0x00007FFE00A70000-0x00007FFE00FBE000-memory.dmp

      Filesize

      5.3MB

    • memory/2704-107-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-104-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-125-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-122-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-91-0x00007FFE1FB70000-0x00007FFE1FD68000-memory.dmp

      Filesize

      2.0MB

    • memory/2704-92-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-95-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-101-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-119-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-116-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-113-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2704-110-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/4644-57-0x00007FFE01060000-0x00007FFE015AE000-memory.dmp

      Filesize

      5.3MB

    • memory/4644-60-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

      Filesize

      1.4MB

    • memory/5068-80-0x00007FFE1FB70000-0x00007FFE1FD68000-memory.dmp

      Filesize

      2.0MB

    • memory/5068-81-0x00000000757A0000-0x000000007591B000-memory.dmp

      Filesize

      1.5MB

    • memory/5068-84-0x00000000757A0000-0x000000007591B000-memory.dmp

      Filesize

      1.5MB