Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 02:54

General

  • Target

    4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e.exe

  • Size

    1.2MB

  • MD5

    2ed1d515b213dfafa2ac37fa4b9e8191

  • SHA1

    b1f09651ad63871c2e41e2db2b29b9f2c3598b12

  • SHA256

    4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e

  • SHA512

    1a0b1e8430844e810f4c23806afa33b318f88d51e1f7aa2646d722d6c1293b7888d97b68e2680e1b8d30c324bc4cc9823782ee7c25b59347f8cab4a7ba3b1ba0

  • SSDEEP

    24576:bN/BUBb+tYjBFHNuuNVEtaST6Zi23v2NEXiM0hD6di/A9n:JpUlRhNV7GaSTTw/XiM0hDTy

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

206.189.218.238:4782

206.189.218.238:2286

206.189.218.238:3363

206.189.218.238:3386

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9IFJWE

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e.exe
    "C:\Users\Admin\AppData\Local\Temp\4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\njnk.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:1264
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c puachd.msc jtllpsq.3gp
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5040
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\puachd.msc
          puachd.msc jtllpsq.3gp
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3108
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1856
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4284
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    ff1a951f747fb9eab2b2ad713d06477b

    SHA1

    00ea608113c0b86d15237c9aa0dea8be7052f762

    SHA256

    62c119819db3143b266688fad565673bc7cab2b1063bbad7b51a32f14bee20b7

    SHA512

    9eceeb7505fc5292d56d5e9039c0cf1301dc0a55fbc449e237e1f76fbca22191760b2d12d1cb2890316a00ca5e7862a1cd1e617ee4c934e7cdc59782504429fa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\akkvgnnbca.3gp

    Filesize

    582B

    MD5

    8895da9a47ea6ff02a277622160c6e00

    SHA1

    def4744002656cfe72ef784cd38e219f4ac938c6

    SHA256

    15547f9086ba0e57e5180958fa7e88fc00352cfe310e7d8f230c45a2799df1c8

    SHA512

    98ed4def73cc005a6e0ea6f16be297d4043a89b85935851440a918e523bbaf65418c11e6294482dc8cf3a6dedeadfeac37a98976ad9b1f394ddd3d39572bb238

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bwoclqaj.das

    Filesize

    515B

    MD5

    1e2250112e4d3d9b3611c24f242533a9

    SHA1

    0c4f4421fcf1a96855d5e5addfc98d216aef519c

    SHA256

    d7164364ac84fb0152498fac802ae96dab8ed74bf9888ebdf6c41ebecbe4ba4e

    SHA512

    ef7c834ea468faa9b43b14dd75bf0aa7ff33ff91a0d1acf37d2037bafceb292214534829f9a29f5c50c911419cc1bb4628ba30c4d7ee7e5913e05ae559460e86

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fqiwhjd.dll

    Filesize

    534B

    MD5

    8810ab5507c9670118f05ac8cfe5dbd3

    SHA1

    16ed36c393129225834c39d50469584c121ea966

    SHA256

    5b7a5af5c268c2dee97fe2af4c1c847fa64d17ea66b957a17ad1754a311faaa6

    SHA512

    094435fb5ab2106a56864e2f62b19a6785507c45f2b57ccb15c29a0128263d6bd06a799cfb8201630739570b4fead3ed953e919759e0e8549c803120dfc74df0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fwajoo.das

    Filesize

    609B

    MD5

    fb79a72711721d9cf264ea3eee000b70

    SHA1

    79ffb687727e2e2b03a37aae32b546c8d06ceb19

    SHA256

    8da0f6e0e38eb20a7036124817c11856ede08758a119964b6de0cd54bf06c331

    SHA512

    57ec7eb71946853ceca327e89e1338c5ad9413e5b5344303d6e91858c182d26e82e2d03577a2744dc10998e48f35f9a612110db5b3e345e9c6e7acde55efe61a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jtjas.txt

    Filesize

    586B

    MD5

    39df90ccfb6b9184ba418e41e955ad84

    SHA1

    6422407acf2eb419aed8ce98d0db780b66b8d9be

    SHA256

    bf556c8c0b1b099a4318bb8947a1c9fe1a96d2b8f09a14dbf42cf6260d9aad37

    SHA512

    852dd8aef4453efa8a3f5aa1d9b95e479d356ea36713db27867c0d291fd631cd43f706c2442fc8d51cd5314ffa493d681553816a2934d7bc6faed13d0309d722

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mgbeebdm.msc

    Filesize

    571B

    MD5

    b82cc237e6a18bb253d375bf92319327

    SHA1

    aa678bdaa5c83948b551e11b306c8afeb5b03afb

    SHA256

    a644c7087793afcb8cfdbe3bf9d99bb5a45f18b1c293078c570c855ded567a15

    SHA512

    1df54f83119d3ebe4c2c0180fa8a41922f899fd01d2c87b0f6a64238c54876512dc3847988730da1ccec2dc2920172d89f71ed06a46b72fa1d544ed8c58078e4

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mrnf.mp3

    Filesize

    36KB

    MD5

    7d5ef9b8fc8ccf868fb5540a2e4a126d

    SHA1

    5739b2035acbeb00e057a7abc3cebfb2d801b41a

    SHA256

    45ed5474e480538082a0923cd2738fdacd7b5437b2386b5faea74e08ab720fd5

    SHA512

    8f1da31f9d10bc285ddaa7a481526658d186f3635e20166696795f7b07084e5f723bd95e834b754e595889ca585932e34aa2606d5c9cb087ba2a69a32fde539b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mrnf.mp3

    Filesize

    36KB

    MD5

    0b889b1ccd9faf5638a162d8d98d1331

    SHA1

    3c5fc5f452071648271e4e5368f54a382586cfde

    SHA256

    62fcf3a4f093f267fd54af93fce5a09608eba265f078345d9de40075a4931655

    SHA512

    e682764d2963d735c12d2e65461ad48b999a51f4f581b6aadd3cdcaac096ded8b5e959e975ddcfccdf219d8189c785dc499a034dc819412c50f1ef93e17f33e6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\njnk.vbe

    Filesize

    169KB

    MD5

    2da4a3a52faa4deb9351d43d2368eb08

    SHA1

    88bb50331a8bded2395b50af9e81a43f0ee3545b

    SHA256

    42ea84f0ecd77198f23c0938eb87ed52815533a30421e6e21bbf3fb8832b6990

    SHA512

    564855fdaddbc2b7c681249fa10f01b5f1f64159476eae165d62eaae757c7e35486c2d4882342756c6865e0968332eaca23224cd842fc9d7e73572101e0f0fa0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\njppllwh.mp3

    Filesize

    527B

    MD5

    01c2585530a1f04b8f47545493d67741

    SHA1

    5ae85d6d6f17d616504ef2b15bc0237086198d11

    SHA256

    2a7015be009060a21ba031b95c837d0e54e9181a0c31191ae223d3fd874479e9

    SHA512

    ea8e4b2546beae1fbc4efa08911471f0be173ca5d352bc3d419f7432d3513324f4d5a89306b628aaf32a10e292faff91d1b74f6933461dd755642db590b92cec

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\nxftmchn.mp3

    Filesize

    595B

    MD5

    24d5381bcddbdaf550d33555eb151b13

    SHA1

    1206bb6e0c5903d785a75414fc42e491b89e599e

    SHA256

    d5ae7b557f0d0ef7928bfa6c95ddbadca354a0e590a01b4e301baa7f52f3ba4c

    SHA512

    0f3faff18f0de923ebb5c961e56022ace3aa735aad961f6f537cad5a48aed888d53458d930b57d47ad5f225249a83cc55d2f10c0ee2094cbbbade8122cb03910

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pgrkjrdrwr.docx

    Filesize

    552B

    MD5

    d341cf78d204d68df14329e5dc76736d

    SHA1

    fa84df15448222a4b50b4adcf4fa36ede79a2e50

    SHA256

    02ca4045fd519b75452e6f62e2b239804b3d31c604b3aaf46250e09191626aac

    SHA512

    6362051ba00881a26b24ebe2da9120d73d49265e097c59e6c43489ed398ce617478ecf2a34ff93e2bbf1e11285fbe8bcc639e07f0e37834086d7c9fb205f3788

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\phcjrkhjbp.bin

    Filesize

    584B

    MD5

    5a55772b9d5705ab5cd475791aaaf326

    SHA1

    748f2043b1822c8a9f17d4a1b444402b790ffd19

    SHA256

    9f96a8d9c7b014187ff7e68502018d803011797c6dfcad01531a122473dc37b0

    SHA512

    800bb0f2143f1f97911b3c4395a17f02b68e4563980e74b1d35aeb56afd1e3b91d081b0d5af05a1b6902039a1c73b37449fc44250a90fbbee8b008f2b96daad0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pkifnicf.xl

    Filesize

    600B

    MD5

    e2bc0137956ad50aba8a6de78d288bc1

    SHA1

    570d917fc485896db77d2bbac6823dea358e3e82

    SHA256

    bbcdc92a9eedd9f3f6bcc3e5300c7fcf0f3c637b398ff48002920692ff709d4d

    SHA512

    24b59425d6ab031417ff3ebe144cf9c00e9e6bd0477110cd0513342140294e4862fffb8d23d3392ccef0ef75b906112b5663f94691be1fbb18de8705082c9b6b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\puachd.msc

    Filesize

    925KB

    MD5

    0adb9b817f1df7807576c2d7068dd931

    SHA1

    4a1b94a9a5113106f40cd8ea724703734d15f118

    SHA256

    98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

    SHA512

    883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qbfovgn.docx

    Filesize

    530B

    MD5

    d16d62e47920fbca44d68d49a3f498e7

    SHA1

    b2d13343bb324b570e6b21b1da8ddd6e4be51443

    SHA256

    1f13dcdcb88cf9c17a2fe2b530c45286226adf44a368894b3da7782f5b006a05

    SHA512

    12a181814092820eee13c03b5b2182b3fdc6378f559f3bcf21f41835f99f47a469020ce421081ec34dea945cefeb35b23eb3a21a6d9615ef1bce4255b480ce9c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\uogxhqjurf.unj

    Filesize

    879KB

    MD5

    ba3227a6a7e9aae129c0fb82bb511b95

    SHA1

    26985630ffdb7ca1caf18b4dd4edbb52a4c840be

    SHA256

    829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762

    SHA512

    ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiawlvwkw.ppt

    Filesize

    611B

    MD5

    874fec7608750f576a5c02061faa516e

    SHA1

    73b0081e470cbafc021b450514b1d29a5b240b12

    SHA256

    4c64c814fada340bf06af521a036a95aef0c8353fcd7cbf5ccf9df78e1943e21

    SHA512

    5ef4b3aff4144160a5664f321f8817a1bd4ee05b7967fb37878d776a6f2089422f6df11f91c3bfec6dc47e6effb361320717e47e6c306151a1aa7b2d26e26846

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xsjduanaek.pdf

    Filesize

    614B

    MD5

    dc5f6bf3e30c74e8b7825d11c2d65fe6

    SHA1

    fc1202386ae5a08614d579af53255c51e179fded

    SHA256

    022dd133d94d4ca79aac1d3f6ae3b01f262b0eddc650f3c9b2d9e5c605326869

    SHA512

    00e4083890cd7b0f0decfdbfb79aae8bdeef484c630dde1d28f8c9151733ccf4bfb32f44fc7ef95a3080d2e3a907a861c65e4c5b3628fa8af589fa54328d23c3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xsrglhc.icm

    Filesize

    560B

    MD5

    f127a97e7c9c6c248c0d1d35cf3e9a3e

    SHA1

    d62b6182baa6fb71317a03095f5396ae2b3cc62f

    SHA256

    3243d6e21b3b3a33dd7692cbd2f7f7683aa614d46d460138cdc9066cbbdab082

    SHA512

    c41d80a3643211c3b635d796e671ab4ef8430618e2b7b1ffb38620aeaaf48f3beb67dc5689c7c333ca1f77d62b9c2f0db883e655dd7e2ba37861e5aece223c55

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • memory/1856-130-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-149-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-126-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-131-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-133-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-143-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-123-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-125-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-155-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-156-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-159-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-164-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-171-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-177-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-178-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB

  • memory/1856-180-0x0000000000940000-0x0000000000E27000-memory.dmp

    Filesize

    4.9MB