Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 08:14

General

  • Target

    RFQ-STACK107947-Handel 9037536899.exe

  • Size

    1.2MB

  • MD5

    47e1e075f34cfeaf55a5f3a02a2e8737

  • SHA1

    e77a60ba845c8e060af8e836e304becf566238f1

  • SHA256

    e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3

  • SHA512

    7631c2b8bbdca6836663f6c6a50a2afe17acae17cd31cfcdb81fd1d9b424c6666e24fffe4c9f60266b5c3c6279497eb71d482810a37b7513171355a10c887e85

  • SSDEEP

    24576:bN/BUBb+tYjBFHNuuNVNtaST6Zi223WD8AvpqFXiM0hD6di/Ad:JpUlRhNV7XaSTTB3Wrx+XiM0hDTc

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

206.189.218.238:4782

206.189.218.238:2286

206.189.218.238:3363

206.189.218.238:3386

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9IFJWE

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ-STACK107947-Handel 9037536899.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xcjj.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:2016
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c exiguvxrrb.mp3 jujqdllgg.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\exiguvxrrb.mp3
          exiguvxrrb.mp3 jujqdllgg.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    dab7b46a4ab4269066b717fa815a95e5

    SHA1

    6f7fb9b2676fec41a48f9bbc66afa1437c03c6a6

    SHA256

    2aebae86fcf7b37c76408362b83a1a21f2189a984a08cd51093d916f14fee22f

    SHA512

    2501a510777937540ad949225219505cef99d60293149a8bef9d6844ac26565a59015407bdef44bc6c4aec952c1e491f840392c0e5948b3d2a7d4c69f10f975c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\apqcpbtwdl.3gp

    Filesize

    540B

    MD5

    de178a4a202c9888ed7a208c6a644149

    SHA1

    d4892d8fcec4b1c57eca7223f4bbfb0506fd0d86

    SHA256

    38d4b4ce2be0f554972ffb928dfebb173eff84fc06239378439e2c81a3d984fb

    SHA512

    1843e3ea7c944c5b5b77404450cf7104d5ceb48790b94304f905a2c2af400c42749397e33687f3e4e203fdb1a62b07daa12b113c6377ac1ed085bdc8ee0fc661

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dlgeokpui.icm

    Filesize

    589B

    MD5

    43ab8138ddbc9794f1dce0a4ba6a4b77

    SHA1

    f09c85ab35e3cae3bfbeee9ad8a82169112f9430

    SHA256

    5282b99fdf8732d28c18c09e8e511d0ace18bf8beb3f3428fc689c3e4ffafee1

    SHA512

    eefe38bfb89688f3bfe51119a6624c6b73229deedb14c9aed4eca81412117a7f971a64ef0dec85105ab4f1680433b53364652a324e6918c817c719d080b3316a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\feiuclh.eis

    Filesize

    879KB

    MD5

    ba3227a6a7e9aae129c0fb82bb511b95

    SHA1

    26985630ffdb7ca1caf18b4dd4edbb52a4c840be

    SHA256

    829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762

    SHA512

    ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fvgvwgj.icm

    Filesize

    636B

    MD5

    7a4680111fe13184dded5fea94deab57

    SHA1

    4d49592817d53f9c5727b64ae51c485c8ce50e2d

    SHA256

    97d2cf558bc2c88fe59361c97d4e0f1effe058507539db2817a22a68408ae539

    SHA512

    5485a1c5f9fafadba68d91a4f87b742f392810c458d783d73646cc46a35074f8ca3b268eb6e7895ee1a6bcddfb9d5251be250c5ded25a57cb0df783641379728

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gcipkjx.bmp

    Filesize

    505B

    MD5

    9a7431dbadb74ce902f3badc0522cde9

    SHA1

    7de32340b63d9371a6df6ff3f527dd3718494507

    SHA256

    1fe9e5fe9e421a044169446ebdc54d526f7ed7189e14b47425edf28fd0705973

    SHA512

    e531547945bbc137ee0154bee4cec0ad83e7d6349e6492058b13845eab0aa98ff69b54fc02d3ae3d476d5f21f274c156b798733137dbe29469d087c2de706309

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ikvxx.pdf

    Filesize

    543B

    MD5

    3f31479ce20169658fc0bece91baa21b

    SHA1

    ac7a707272f9a133d2e2af767c5bb0dcafb856cc

    SHA256

    f663efea5d17f2f90e06476dd0bd9aad18f5c90b9c6ecd022b7160fca4461157

    SHA512

    0a768f29c6d8b2d1c182620636826b975bae75349e218a18cd2c0718602bd727946dc8840d03b567609f4889927365fd3b28f92d37b4588005e20cfbd24e4a88

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\liprs.xl

    Filesize

    561B

    MD5

    efe9dc4398235606e348de0013613184

    SHA1

    e27eef54f971a81bdc9aea7d9f8c3a84aaa8ec17

    SHA256

    0020a0b64c7d7a95332bdc6543570b22435b9c6527c272fd69482f110cd78c3b

    SHA512

    e7b79ffa520e8b6e642d0db64393a451ded061c212fcd4a187825f5f841ecc16a28b167f653d0b150d368bbe717fa185df24a48acff4b91281da1655d7496b0c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lwamsv.bmp

    Filesize

    621B

    MD5

    11a0b4476265f1b9bd3bfc3cbcca409a

    SHA1

    ee306624f25b60f575faded8aff91ff6e28b2e9b

    SHA256

    39e19d90cfc180f1111493759da8332a33556e5f740304a8d93ff7eebe5821e0

    SHA512

    ed7b19d4cc6acb124cccecc5d73e4fac8dda1fc8e742bd61a932ce97a7b9ede679ddcbaff3eb43c79137635ecc2a58fdb87eb25e0a7e8ba4e713f76d025538d6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcnrnxdb.xls

    Filesize

    569B

    MD5

    89e312356ee07d906a15cc74b6232498

    SHA1

    8e0d8c1dbe8f98fa7a58a24eb06cec1230199591

    SHA256

    a3257e955945f6e1fac689fe2efad79ec9511e54140b550b95f99bc849478205

    SHA512

    1d296d08ea8b0962b6e067e47146746a4c2399868073b6beffbb85c359727aa3f2825e7807bcbdfbf75bcab07521d3eb0567a89c37d011d0088ad3f809cf3e15

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mvoewmrukx.jpg

    Filesize

    529B

    MD5

    fad42d64e2ba33efc46ae738fb5b0a65

    SHA1

    6283fdad73c2e71f01653404a84cb04d6b1e72b6

    SHA256

    1ff4a0f98969d45df0bb6aab8bd32fd9a5db6b2c3311687a6784340fe92deb3b

    SHA512

    07d775a9801c5159b6b8d8c7c99f1dfc7db2757b6c195fef94f919301d4189c3ba99ab2f39e4de578661086bd51bfd9537e6df96b0f15b9532cc67a7f6c0b380

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\najtbe.3gp

    Filesize

    525B

    MD5

    26d1ef03f059035062a953fe56189805

    SHA1

    24627042e99874582bf23a3cafbe84488dfddc2d

    SHA256

    df23df9b0925d87f771fe30c4941968a7941d30e61fc095f5858859998e9a3a4

    SHA512

    6373d740a7c2067b8a0f044f9a3b88a699a3024f0b3588efe97804f5ffee8d766737b616646fce37f15446396e82abb8bfb60bb0a5221b1b2f60f5a1e3cee931

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\oecugxepx.3gp

    Filesize

    38KB

    MD5

    5a16abae8e2e76243cb64e663c433b7c

    SHA1

    33603c697a678d7de33337d4cc256823a757e370

    SHA256

    0f3346373c8f156af575a6cf5fddea7a0591e9e98c55911da92c1d0247b42879

    SHA512

    ae7b40466e076e3f5e134c144bcf0387376e8848290d500b1680fd815682a5cffe323385f382d191fc36f77fdc168062d02ea5085c440af95df6c9f21bf8aa58

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\oecugxepx.3gp

    Filesize

    38KB

    MD5

    4ba1e3dd70b841631605154d0a873e12

    SHA1

    3822b13b2cc21b0e6eece2a369ce270711d34f09

    SHA256

    c0463353430c226c83582d11c75816d54dc896e27ca9f6200571c90cbec7d156

    SHA512

    abbaa2045a0eef1daa302e1fb4d241256293f52ade097d4076df7af9d77fe1c881fb21b87bb6b506f965af41b69f8db410c81f6c13688919a193cbd3416a14b5

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ouosfk.txt

    Filesize

    516B

    MD5

    640f2177d9892474d0ac242c3667f3ff

    SHA1

    e3de1e8744713f4c8eea3d22810caaf6b98a38d5

    SHA256

    5370805ea5277af13d06cba90923f43f89ce71b307f1a5bc8713078d73fdcfae

    SHA512

    b03300bc6e37b18f80a8028a6ce9efd76bc9d9475fbd3bd1226ef4aa746214254e896fc8ee979e34f0d626317c203e990a938b481c23346ee502e7481f872b60

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pliqgq.jpg

    Filesize

    562B

    MD5

    ff26772d011d610c7f4bdd0a05401831

    SHA1

    023503721ab26a0266caac724b5ed945c6c44c3d

    SHA256

    78f9d09766359845345936b969282547fba8a5d1a9153eb9f6b7832ca306941e

    SHA512

    21ae9e92426494782594355582ba6c7bbce0fc741ba598570306b3bfc4b74a4df6d8cf18cd8e755230d42133598b9aa5ba2c5b3df94de302505b5649f2c10853

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pwkwdmn.bin

    Filesize

    541B

    MD5

    9d2a1420104961db5f6c3acdd78c5413

    SHA1

    aed36a59b5e04e74dba7993108a3036bc0c4841c

    SHA256

    68e829ee0130254050cebb8138bcf651453d4cc85267408c32536e549cd64797

    SHA512

    7cbdf7ace371d7eed837b3a1f4fe3c4cb8a71b423fec30c3fd2868d7dac561c39f7eb15beea94ef67edc782210d3297f610e6e251401e6cbb8b0df6e702e31a2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwukx.das

    Filesize

    547B

    MD5

    7f669e5f6c40f60176941426b38c636f

    SHA1

    ba19a13d936e2484091b034dec5a797f82fc0471

    SHA256

    f806baf083a66ee897f8d9df01c94450cc497020fae845aee7a3ad9658de8bb6

    SHA512

    6c021e4af83758c1d4e24537f40499c68499e36deca4bf052f6ad35ed4ebbc7bf7096f38f43478fd21a689cc4330f78662599c39a72ca9bd48ac7d1ab6205c66

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rxcj.pdf

    Filesize

    601B

    MD5

    74d3eb0b1855cd07983c292bb948d99d

    SHA1

    4697ee314d8ebebd7eac6c59a7448a61e409a64f

    SHA256

    2d1e1cb356c1fc8dad4f704f2132e26c9d61aa6807c3663805cb3edffd54309d

    SHA512

    bbd22f507e9c163df6d1c0806e72615d444615bcac0e2c726c40260e76f91ae3168dff74d86435a22c701cb2167e2a555340984608f3e60fd68bd0cc6f3bc7a9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tetpvtk.bmp

    Filesize

    570B

    MD5

    16f8862470abc9bd3d5af4f6458a2c57

    SHA1

    212d077a18d28b73fbf7df9d633159b22e627505

    SHA256

    05b2d07b29ce1f6b110a3bb9232fc05cbd8f46e40318a18496a5c4f882388c4c

    SHA512

    604cbff97d151d314c41e5da9a6ea5f5c8d6514713810e64dd3b085be3e46a6617284af838d5b15da1eeeb2d897528dc20d73b273ca53f9c4d96c3386809f3c7

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tpmh.icm

    Filesize

    588B

    MD5

    fdc0435dee47f452b76364dad3ff3851

    SHA1

    2c7e75bc1d2b2eeafaa17c60265d13143eb2a5db

    SHA256

    ef71c9b03d4d8b03f39f052f46b37d89536f35427bce1104913c10da3b9c1fa1

    SHA512

    35693775653fd90add369b4a811d10fe4cb621075347263b09560f0c7bfa93309de737f18a719f2339fd3830b312cc14c18062d2b80abcb74ae3ff57c229d274

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xcjj.vbe

    Filesize

    193KB

    MD5

    5020f5d94271ef49423393f311102b84

    SHA1

    65d7cafb647474b3278700253e453994c8c5c258

    SHA256

    a43c103960d14ddba7698b76852aebde85546b01cb51fd309a05577ca89cb757

    SHA512

    4c10f02f12e81ab055e8b6df8cc64e087be826db89b81ba3b8434f2a3d988d32e4ed5587d7dfc57d809ae75544c0f26462977afff569b7a49bb58bac2c9851bd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xodjqjuai.mp2

    Filesize

    510B

    MD5

    6db48d994592c7e89326e10e0534f02e

    SHA1

    aa594bec5eba9cb186c30846c84fbf8d6ce88207

    SHA256

    06e928e3cd0c3e5ba69009535950c5a9f2848f86b68341fadc05cd6d885f3daa

    SHA512

    dcc67b7a13bc1ff78c88fc7ea3f774c57ea68c054cbe1bff9cf89fa412f0502999ebae57d635c28c42f549df04b5590444899910b143b4b1d90540e2642c5b66

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xuouulf.bmp

    Filesize

    514B

    MD5

    bd4f78f00044397b048515feac7d70f9

    SHA1

    4b1b749c5e6cabbee3f24518680302426eee6f5f

    SHA256

    8ff5afb75964a740cddfdde8b059d4ea069ec44d4e11fc70824433a9a1830914

    SHA512

    9f784e1e8f92e599ca9931916e7b909f4b18a4ded43b0712c231ced5351ae2b729f07f258e5d72c4e9f495a6cedf31204e2f1a98d0aa45f21e54f9312b8dee38

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xwcnligrom.txt

    Filesize

    568B

    MD5

    9130e3d39ad7a5a96b41bb801ebeb126

    SHA1

    85088abd1788bbd886ac37c3a4b4b6f13e2effa3

    SHA256

    e37478a8080c9dc35926872ea64541b112bcd9406e48243c9794f95ce30327e0

    SHA512

    eef4013e76613897c5b13ce536fd26e257b5f3086d80d32a9b77af3cfa90862dc40fbefba3021e4bd3dfb045500c49473b605e1517daf561f5a0e9bf4a3ac786

  • \Users\Admin\AppData\Local\Temp\RarSFX0\exiguvxrrb.mp3

    Filesize

    925KB

    MD5

    0adb9b817f1df7807576c2d7068dd931

    SHA1

    4a1b94a9a5113106f40cd8ea724703734d15f118

    SHA256

    98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

    SHA512

    883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

  • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • memory/2352-159-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-150-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2352-153-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-148-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-158-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-154-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-167-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-151-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-173-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-178-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-179-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-185-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-187-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-189-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB

  • memory/2352-194-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB