Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17/01/2025, 18:56

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    9.4MB

  • MD5

    e08f4ef0a8695fb151e2af8e54bd2344

  • SHA1

    a399a4c848148af77f9f75ec4e8d3688009ba2cf

  • SHA256

    702675900bbfaca101c29391fc497066b5649c123f41383a69562a886efd1112

  • SHA512

    6a3fe318de56195912563fdb2516a1f7f9ffec3a03043e6131a93a89eb45d5aff526b23d82e005894a316bd07d70295c49f893932d6d20dee44f5cf054f3d23a

  • SSDEEP

    196608:fS904j9o9QA4SH3cKSXf4eOrIZ9bnF/dMT5zLy45TH7xtino:i04RoDNH3cKSP4eOriJF1MFzLyybxt

Malware Config

Extracted

Family

remcos

Botnet

OCTUBRE 31 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    elecvac

  • mouse_option

    false

  • mutex

    prointerca-JFYAH7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 26 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:4
      2⤵
        PID:1784
      • C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe
        "C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Users\Admin\AppData\Roaming\ComBrowserinl\PasswordChanger.exe
          C:\Users\Admin\AppData\Roaming\ComBrowserinl\PasswordChanger.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:5068
            • C:\Users\Admin\AppData\Local\Temp\validCtrl.exe
              C:\Users\Admin\AppData\Local\Temp\validCtrl.exe
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2704
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3300

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e579c70.rbs

            Filesize

            9KB

            MD5

            bbf0e966bfd2fe9c0d339960477d4efd

            SHA1

            0465e78a07c65ba98f871b8153b756c4492fd1c1

            SHA256

            28e74fd7a4e829dec1bc40abada7691814a8ce9e1aab382fd88b4e3e7a036a47

            SHA512

            d1b967f5205c27497e047e8c200d860119e5dc819b6420a9132ff7277a3c197fd4dfa44a781fdf6b0e208ec09149546f149ef18bf7d01680d5024fe7c1578edc

          • C:\ProgramData\elecvac\logs.dat

            Filesize

            144B

            MD5

            48df6721d91fbbcccfcde4e076f96bc2

            SHA1

            ab3b25377146a621762a945d321a321d7047b8b4

            SHA256

            bf9b672740942ec42ca8b09c3c5b7e63361e25dfd9abf6d29abd673e2e0422f7

            SHA512

            248b3928c9f98303afc33aaa7b7844452c61349d7f6534c6d60ddc07b7ccaec4673871d38cc1ffe74c845409a5b24230377e8146c49d7a1b17287d5bd42b9a34

          • C:\Users\Admin\AppData\Local\Temp\4c286cd6

            Filesize

            1.6MB

            MD5

            bd6b5c2a4c9f675e71a770910a652890

            SHA1

            7aa170db295d1ba2e8d391bcfa389f5b7139b343

            SHA256

            566ec72bd129849133471f85e8c337ae56b7133f9de070446211ca1c2d7a82d5

            SHA512

            e4808512eb4edccd8fd40cd910711b7e2a7456f1edbdefdf6ea94d4174ea57e82f20453527034cd8b9298ad43b7848c458a2a493b57592ed5fc79f061d9da8e3

          • C:\Users\Admin\AppData\Local\Temp\validCtrl.exe

            Filesize

            433KB

            MD5

            fea067901f48a5f1faf7ca3b373f1a8f

            SHA1

            e8abe0deb87de9fe3bb3a611234584e9a9b17cce

            SHA256

            bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

            SHA512

            07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

          • C:\Users\Admin\AppData\Roaming\Leukemia\PasswordChanger.exe

            Filesize

            2.7MB

            MD5

            8915b9ccb4372a418729166dcedc5a44

            SHA1

            8f6ca11bcb5a53fe90007ec83b638b0c642d2a92

            SHA256

            6f7f390b2012e7dfef9fcbd673a4a0256e2e217b11831e9a27a9d460ba57c0d2

            SHA512

            fd7bd3a8d3a8331d4fdd331a41dc1b3efcdbb29062a8d316cf07edccc05e7eb81153f01ec95df68f9d1466ecee0be49684737f6cf895fe6e55ccf163f1058e66

          • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Core.dll

            Filesize

            5.8MB

            MD5

            afa545d4093e02bf92599fd19639c2d4

            SHA1

            8de6846f2f2dd1f24fafce597193d71d12d52666

            SHA256

            6da23d106b1acf03fff55667efa5bd9f12cd1d608d6b0627dddd64a4ab34ca99

            SHA512

            318d5e144c328df50ae4708dd506d2c7240a94e723fa4beeb0e2a63726ff1801765ac0f0380776aeec2e6c0fb48929f399c61ce14a19ff152cb83347b038bdb1

          • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Gui.dll

            Filesize

            6.2MB

            MD5

            34893cb3d9a2250f0edecd68aedb72c7

            SHA1

            37161412df2c1313a54749fe6f33e4dbf41d128a

            SHA256

            ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

            SHA512

            484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

          • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Network.dll

            Filesize

            1.3MB

            MD5

            fe5ed4c5da03077f98c3efa91ecefd81

            SHA1

            e23e839ec0602662788f761ebe7dd4b39c018a7f

            SHA256

            d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

            SHA512

            22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

          • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5PrintSupport.dll

            Filesize

            316KB

            MD5

            d0634933db2745397a603d5976bee8e7

            SHA1

            ddec98433bcfec1d9e38557d803bc73e1ff883b6

            SHA256

            7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

            SHA512

            9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

          • C:\Users\Admin\AppData\Roaming\Leukemia\Qt5Widgets.dll

            Filesize

            5.3MB

            MD5

            c502bb8a4a7dc3724ab09292cd3c70d6

            SHA1

            ff44fddeec2d335ec0eaa861714b561f899675fd

            SHA256

            4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

            SHA512

            73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

          • C:\Users\Admin\AppData\Roaming\Leukemia\aeiyq

            Filesize

            29KB

            MD5

            da9135d38ad1bc95d770128afa7477fc

            SHA1

            3c64a33874159588736c39044050f4683da59f2d

            SHA256

            5f2ec637d706ead4ffa9191c0587812f7660b5ecad4de4ac5c5ea67b51e850a0

            SHA512

            d8a38c69d86d284a52bce9300c39f6a649a1dff83f20a9cc623624d79ef2e49ffd80897b43a5d5d3a2eaffac86777e535e7ddac5f4a5b564c27437c2f2f2f32c

          • C:\Users\Admin\AppData\Roaming\Leukemia\eisp

            Filesize

            1.1MB

            MD5

            e9015ad11b27fb4658df512dee18dec6

            SHA1

            cfc9f12da3e2000c261afc32aa9ba00567357547

            SHA256

            c41f840f049f420cc0eee1a9e88d5ee1d79d79e03ad41b4d64a6fc87974987ea

            SHA512

            b40f21603a5347a8992c2d3e367888d23b15bf3f0e224d85d4e703b44b6ed5812cb3cc51a73d139c6d2248fe1d993e075fe994237a0787a8d799845ab78e12e5

          • C:\Users\Admin\AppData\Roaming\Leukemia\msvcp140.dll

            Filesize

            557KB

            MD5

            7db24201efea565d930b7ec3306f4308

            SHA1

            880c8034b1655597d0eebe056719a6f79b60e03c

            SHA256

            72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

            SHA512

            bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

          • C:\Users\Admin\AppData\Roaming\Leukemia\vcruntime140.dll

            Filesize

            96KB

            MD5

            f12681a472b9dd04a812e16096514974

            SHA1

            6fd102eb3e0b0e6eef08118d71f28702d1a9067c

            SHA256

            d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

            SHA512

            7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

          • C:\Users\Admin\AppData\Roaming\Leukemia\vcruntime140_1.dll

            Filesize

            37KB

            MD5

            75e78e4bf561031d39f86143753400ff

            SHA1

            324c2a99e39f8992459495182677e91656a05206

            SHA256

            1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

            SHA512

            ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

          • C:\Windows\Installer\e579c6f.msi

            Filesize

            9.4MB

            MD5

            e08f4ef0a8695fb151e2af8e54bd2344

            SHA1

            a399a4c848148af77f9f75ec4e8d3688009ba2cf

            SHA256

            702675900bbfaca101c29391fc497066b5649c123f41383a69562a886efd1112

            SHA512

            6a3fe318de56195912563fdb2516a1f7f9ffec3a03043e6131a93a89eb45d5aff526b23d82e005894a316bd07d70295c49f893932d6d20dee44f5cf054f3d23a

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            23.9MB

            MD5

            afd09bbe2710ecc21497fd0292e8a765

            SHA1

            a86702da23f0ff2faa33d80b72ad3a24ac7ecb68

            SHA256

            fbbd3be4523217749423352366dc7811638285dda5bb773cd250f19d4c14ddde

            SHA512

            5ea23810b9459d2037f846b788616a53d8f6784967a98cae2057cf4b34fa56ec2cd4d45b91762de63363e16e7c1532b4e70fa32cd99ff1919739b2f78e69d5f7

          • \??\Volume{1f3febba-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{115e0a0b-b5a4-4949-89e1-273da48b39af}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            d5c62ae8497ddb66cae2941eb124af22

            SHA1

            527765ad40cd9c4c402375f9a82420df729ca16c

            SHA256

            6df24c8c5cdc50b7a9a25f02b20db70f1a69c2b26a3fa811f731e8d888ac6095

            SHA512

            a382dfa7b1c984ff952849d176f21f2a780b3ce0d85b24785753440fb9c7affec0728eb867c9ebf7e5a7faba3c783bc8d5f719fc841dff9587ca2c3e4dc5afba

          • memory/2308-76-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

            Filesize

            1.4MB

          • memory/2308-77-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

            Filesize

            1.4MB

          • memory/2308-75-0x00007FFE00A70000-0x00007FFE00FBE000-memory.dmp

            Filesize

            5.3MB

          • memory/2704-107-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-104-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-125-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-122-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-91-0x00007FFE1FB70000-0x00007FFE1FD68000-memory.dmp

            Filesize

            2.0MB

          • memory/2704-92-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-95-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-101-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-119-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-116-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-113-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/2704-110-0x0000000000400000-0x0000000000483000-memory.dmp

            Filesize

            524KB

          • memory/4644-57-0x00007FFE01060000-0x00007FFE015AE000-memory.dmp

            Filesize

            5.3MB

          • memory/4644-60-0x00007FFE000C0000-0x00007FFE00232000-memory.dmp

            Filesize

            1.4MB

          • memory/5068-80-0x00007FFE1FB70000-0x00007FFE1FD68000-memory.dmp

            Filesize

            2.0MB

          • memory/5068-81-0x00000000757A0000-0x000000007591B000-memory.dmp

            Filesize

            1.5MB

          • memory/5068-84-0x00000000757A0000-0x000000007591B000-memory.dmp

            Filesize

            1.5MB