Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 03:50
Static task
static1
Behavioral task
behavioral1
Sample
Ref. 56433905218740.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Ref. 56433905218740.exe
Resource
win10v2004-20241007-en
General
-
Target
Ref. 56433905218740.exe
-
Size
1.2MB
-
MD5
2ed1d515b213dfafa2ac37fa4b9e8191
-
SHA1
b1f09651ad63871c2e41e2db2b29b9f2c3598b12
-
SHA256
4ee8706cd6bf820a75a528e933d35a306ac18d466cc989a3317be9f5be9c1e5e
-
SHA512
1a0b1e8430844e810f4c23806afa33b318f88d51e1f7aa2646d722d6c1293b7888d97b68e2680e1b8d30c324bc4cc9823782ee7c25b59347f8cab4a7ba3b1ba0
-
SSDEEP
24576:bN/BUBb+tYjBFHNuuNVEtaST6Zi23v2NEXiM0hD6di/A9n:JpUlRhNV7GaSTTw/XiM0hDTy
Malware Config
Extracted
remcos
RemoteHost
206.189.218.238:4782
206.189.218.238:2286
206.189.218.238:3363
206.189.218.238:3386
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9IFJWE
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Ref. 56433905218740.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 384 puachd.msc 976 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\qpjx\\PUACHD~1.EXE C:\\Users\\Admin\\AppData\\Roaming\\qpjx\\jtllpsq.3gp" puachd.msc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 384 set thread context of 976 384 puachd.msc 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puachd.msc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ref. 56433905218740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3600 ipconfig.exe 3108 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings Ref. 56433905218740.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc 384 puachd.msc -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 976 RegSvcs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2980 wrote to memory of 760 2980 Ref. 56433905218740.exe 83 PID 2980 wrote to memory of 760 2980 Ref. 56433905218740.exe 83 PID 2980 wrote to memory of 760 2980 Ref. 56433905218740.exe 83 PID 760 wrote to memory of 3684 760 WScript.exe 88 PID 760 wrote to memory of 3684 760 WScript.exe 88 PID 760 wrote to memory of 3684 760 WScript.exe 88 PID 760 wrote to memory of 3124 760 WScript.exe 90 PID 760 wrote to memory of 3124 760 WScript.exe 90 PID 760 wrote to memory of 3124 760 WScript.exe 90 PID 3684 wrote to memory of 3108 3684 cmd.exe 92 PID 3684 wrote to memory of 3108 3684 cmd.exe 92 PID 3684 wrote to memory of 3108 3684 cmd.exe 92 PID 3124 wrote to memory of 384 3124 cmd.exe 93 PID 3124 wrote to memory of 384 3124 cmd.exe 93 PID 3124 wrote to memory of 384 3124 cmd.exe 93 PID 760 wrote to memory of 2936 760 WScript.exe 96 PID 760 wrote to memory of 2936 760 WScript.exe 96 PID 760 wrote to memory of 2936 760 WScript.exe 96 PID 2936 wrote to memory of 3600 2936 cmd.exe 98 PID 2936 wrote to memory of 3600 2936 cmd.exe 98 PID 2936 wrote to memory of 3600 2936 cmd.exe 98 PID 384 wrote to memory of 976 384 puachd.msc 101 PID 384 wrote to memory of 976 384 puachd.msc 101 PID 384 wrote to memory of 976 384 puachd.msc 101 PID 384 wrote to memory of 976 384 puachd.msc 101 PID 384 wrote to memory of 976 384 puachd.msc 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref. 56433905218740.exe"C:\Users\Admin\AppData\Local\Temp\Ref. 56433905218740.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\njnk.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c puachd.msc jtllpsq.3gp3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\puachd.mscpuachd.msc jtllpsq.3gp4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:976
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD53c8a7a05ad95f655ed29601c2422ab6a
SHA16069ca561d00dfe17136c5d3905c7cffe89a80ee
SHA2563e5ea935a6a8f05fb39c830cd3ceda75d1625c6115df5d8d1aa2df494cfe2731
SHA512b22329857ece1815e154cd08c3cb14a9cd210927e75e16b3d5dee312f0339e05b4c0ae5294f9fbc731eb6980a565de306b60a5c49f01f3ef179fb8c30737e878
-
Filesize
582B
MD58895da9a47ea6ff02a277622160c6e00
SHA1def4744002656cfe72ef784cd38e219f4ac938c6
SHA25615547f9086ba0e57e5180958fa7e88fc00352cfe310e7d8f230c45a2799df1c8
SHA51298ed4def73cc005a6e0ea6f16be297d4043a89b85935851440a918e523bbaf65418c11e6294482dc8cf3a6dedeadfeac37a98976ad9b1f394ddd3d39572bb238
-
Filesize
515B
MD51e2250112e4d3d9b3611c24f242533a9
SHA10c4f4421fcf1a96855d5e5addfc98d216aef519c
SHA256d7164364ac84fb0152498fac802ae96dab8ed74bf9888ebdf6c41ebecbe4ba4e
SHA512ef7c834ea468faa9b43b14dd75bf0aa7ff33ff91a0d1acf37d2037bafceb292214534829f9a29f5c50c911419cc1bb4628ba30c4d7ee7e5913e05ae559460e86
-
Filesize
534B
MD58810ab5507c9670118f05ac8cfe5dbd3
SHA116ed36c393129225834c39d50469584c121ea966
SHA2565b7a5af5c268c2dee97fe2af4c1c847fa64d17ea66b957a17ad1754a311faaa6
SHA512094435fb5ab2106a56864e2f62b19a6785507c45f2b57ccb15c29a0128263d6bd06a799cfb8201630739570b4fead3ed953e919759e0e8549c803120dfc74df0
-
Filesize
609B
MD5fb79a72711721d9cf264ea3eee000b70
SHA179ffb687727e2e2b03a37aae32b546c8d06ceb19
SHA2568da0f6e0e38eb20a7036124817c11856ede08758a119964b6de0cd54bf06c331
SHA51257ec7eb71946853ceca327e89e1338c5ad9413e5b5344303d6e91858c182d26e82e2d03577a2744dc10998e48f35f9a612110db5b3e345e9c6e7acde55efe61a
-
Filesize
586B
MD539df90ccfb6b9184ba418e41e955ad84
SHA16422407acf2eb419aed8ce98d0db780b66b8d9be
SHA256bf556c8c0b1b099a4318bb8947a1c9fe1a96d2b8f09a14dbf42cf6260d9aad37
SHA512852dd8aef4453efa8a3f5aa1d9b95e479d356ea36713db27867c0d291fd631cd43f706c2442fc8d51cd5314ffa493d681553816a2934d7bc6faed13d0309d722
-
Filesize
571B
MD5b82cc237e6a18bb253d375bf92319327
SHA1aa678bdaa5c83948b551e11b306c8afeb5b03afb
SHA256a644c7087793afcb8cfdbe3bf9d99bb5a45f18b1c293078c570c855ded567a15
SHA5121df54f83119d3ebe4c2c0180fa8a41922f899fd01d2c87b0f6a64238c54876512dc3847988730da1ccec2dc2920172d89f71ed06a46b72fa1d544ed8c58078e4
-
Filesize
36KB
MD57d5ef9b8fc8ccf868fb5540a2e4a126d
SHA15739b2035acbeb00e057a7abc3cebfb2d801b41a
SHA25645ed5474e480538082a0923cd2738fdacd7b5437b2386b5faea74e08ab720fd5
SHA5128f1da31f9d10bc285ddaa7a481526658d186f3635e20166696795f7b07084e5f723bd95e834b754e595889ca585932e34aa2606d5c9cb087ba2a69a32fde539b
-
Filesize
36KB
MD50b889b1ccd9faf5638a162d8d98d1331
SHA13c5fc5f452071648271e4e5368f54a382586cfde
SHA25662fcf3a4f093f267fd54af93fce5a09608eba265f078345d9de40075a4931655
SHA512e682764d2963d735c12d2e65461ad48b999a51f4f581b6aadd3cdcaac096ded8b5e959e975ddcfccdf219d8189c785dc499a034dc819412c50f1ef93e17f33e6
-
Filesize
169KB
MD52da4a3a52faa4deb9351d43d2368eb08
SHA188bb50331a8bded2395b50af9e81a43f0ee3545b
SHA25642ea84f0ecd77198f23c0938eb87ed52815533a30421e6e21bbf3fb8832b6990
SHA512564855fdaddbc2b7c681249fa10f01b5f1f64159476eae165d62eaae757c7e35486c2d4882342756c6865e0968332eaca23224cd842fc9d7e73572101e0f0fa0
-
Filesize
527B
MD501c2585530a1f04b8f47545493d67741
SHA15ae85d6d6f17d616504ef2b15bc0237086198d11
SHA2562a7015be009060a21ba031b95c837d0e54e9181a0c31191ae223d3fd874479e9
SHA512ea8e4b2546beae1fbc4efa08911471f0be173ca5d352bc3d419f7432d3513324f4d5a89306b628aaf32a10e292faff91d1b74f6933461dd755642db590b92cec
-
Filesize
595B
MD524d5381bcddbdaf550d33555eb151b13
SHA11206bb6e0c5903d785a75414fc42e491b89e599e
SHA256d5ae7b557f0d0ef7928bfa6c95ddbadca354a0e590a01b4e301baa7f52f3ba4c
SHA5120f3faff18f0de923ebb5c961e56022ace3aa735aad961f6f537cad5a48aed888d53458d930b57d47ad5f225249a83cc55d2f10c0ee2094cbbbade8122cb03910
-
Filesize
552B
MD5d341cf78d204d68df14329e5dc76736d
SHA1fa84df15448222a4b50b4adcf4fa36ede79a2e50
SHA25602ca4045fd519b75452e6f62e2b239804b3d31c604b3aaf46250e09191626aac
SHA5126362051ba00881a26b24ebe2da9120d73d49265e097c59e6c43489ed398ce617478ecf2a34ff93e2bbf1e11285fbe8bcc639e07f0e37834086d7c9fb205f3788
-
Filesize
584B
MD55a55772b9d5705ab5cd475791aaaf326
SHA1748f2043b1822c8a9f17d4a1b444402b790ffd19
SHA2569f96a8d9c7b014187ff7e68502018d803011797c6dfcad01531a122473dc37b0
SHA512800bb0f2143f1f97911b3c4395a17f02b68e4563980e74b1d35aeb56afd1e3b91d081b0d5af05a1b6902039a1c73b37449fc44250a90fbbee8b008f2b96daad0
-
Filesize
600B
MD5e2bc0137956ad50aba8a6de78d288bc1
SHA1570d917fc485896db77d2bbac6823dea358e3e82
SHA256bbcdc92a9eedd9f3f6bcc3e5300c7fcf0f3c637b398ff48002920692ff709d4d
SHA51224b59425d6ab031417ff3ebe144cf9c00e9e6bd0477110cd0513342140294e4862fffb8d23d3392ccef0ef75b906112b5663f94691be1fbb18de8705082c9b6b
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
530B
MD5d16d62e47920fbca44d68d49a3f498e7
SHA1b2d13343bb324b570e6b21b1da8ddd6e4be51443
SHA2561f13dcdcb88cf9c17a2fe2b530c45286226adf44a368894b3da7782f5b006a05
SHA51212a181814092820eee13c03b5b2182b3fdc6378f559f3bcf21f41835f99f47a469020ce421081ec34dea945cefeb35b23eb3a21a6d9615ef1bce4255b480ce9c
-
Filesize
879KB
MD5ba3227a6a7e9aae129c0fb82bb511b95
SHA126985630ffdb7ca1caf18b4dd4edbb52a4c840be
SHA256829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762
SHA512ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef
-
Filesize
611B
MD5874fec7608750f576a5c02061faa516e
SHA173b0081e470cbafc021b450514b1d29a5b240b12
SHA2564c64c814fada340bf06af521a036a95aef0c8353fcd7cbf5ccf9df78e1943e21
SHA5125ef4b3aff4144160a5664f321f8817a1bd4ee05b7967fb37878d776a6f2089422f6df11f91c3bfec6dc47e6effb361320717e47e6c306151a1aa7b2d26e26846
-
Filesize
614B
MD5dc5f6bf3e30c74e8b7825d11c2d65fe6
SHA1fc1202386ae5a08614d579af53255c51e179fded
SHA256022dd133d94d4ca79aac1d3f6ae3b01f262b0eddc650f3c9b2d9e5c605326869
SHA51200e4083890cd7b0f0decfdbfb79aae8bdeef484c630dde1d28f8c9151733ccf4bfb32f44fc7ef95a3080d2e3a907a861c65e4c5b3628fa8af589fa54328d23c3
-
Filesize
560B
MD5f127a97e7c9c6c248c0d1d35cf3e9a3e
SHA1d62b6182baa6fb71317a03095f5396ae2b3cc62f
SHA2563243d6e21b3b3a33dd7692cbd2f7f7683aa614d46d460138cdc9066cbbdab082
SHA512c41d80a3643211c3b635d796e671ab4ef8430618e2b7b1ffb38620aeaaf48f3beb67dc5689c7c333ca1f77d62b9c2f0db883e655dd7e2ba37861e5aece223c55
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b