Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 03:44
Static task
static1
Behavioral task
behavioral1
Sample
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe
Resource
win10v2004-20241007-en
General
-
Target
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe
-
Size
1.2MB
-
MD5
47e1e075f34cfeaf55a5f3a02a2e8737
-
SHA1
e77a60ba845c8e060af8e836e304becf566238f1
-
SHA256
e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3
-
SHA512
7631c2b8bbdca6836663f6c6a50a2afe17acae17cd31cfcdb81fd1d9b424c6666e24fffe4c9f60266b5c3c6279497eb71d482810a37b7513171355a10c887e85
-
SSDEEP
24576:bN/BUBb+tYjBFHNuuNVNtaST6Zi223WD8AvpqFXiM0hD6di/Ad:JpUlRhNV7XaSTTB3Wrx+XiM0hDTc
Malware Config
Extracted
remcos
RemoteHost
206.189.218.238:4782
206.189.218.238:2286
206.189.218.238:3363
206.189.218.238:3386
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9IFJWE
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4300 exiguvxrrb.mp3 4792 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimerDate = "C:\\Users\\Admin\\gase\\EXIGUV~1.EXE C:\\Users\\Admin\\gase\\JUJQDL~1.EXE" exiguvxrrb.mp3 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4300 set thread context of 4792 4300 exiguvxrrb.mp3 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exiguvxrrb.mp3 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1716 ipconfig.exe 1864 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 4300 exiguvxrrb.mp3 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4792 RegSvcs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1372 wrote to memory of 5076 1372 e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe 83 PID 1372 wrote to memory of 5076 1372 e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe 83 PID 1372 wrote to memory of 5076 1372 e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe 83 PID 5076 wrote to memory of 1548 5076 WScript.exe 88 PID 5076 wrote to memory of 1548 5076 WScript.exe 88 PID 5076 wrote to memory of 1548 5076 WScript.exe 88 PID 5076 wrote to memory of 4832 5076 WScript.exe 90 PID 5076 wrote to memory of 4832 5076 WScript.exe 90 PID 5076 wrote to memory of 4832 5076 WScript.exe 90 PID 1548 wrote to memory of 1716 1548 cmd.exe 92 PID 1548 wrote to memory of 1716 1548 cmd.exe 92 PID 1548 wrote to memory of 1716 1548 cmd.exe 92 PID 4832 wrote to memory of 4300 4832 cmd.exe 93 PID 4832 wrote to memory of 4300 4832 cmd.exe 93 PID 4832 wrote to memory of 4300 4832 cmd.exe 93 PID 5076 wrote to memory of 892 5076 WScript.exe 96 PID 5076 wrote to memory of 892 5076 WScript.exe 96 PID 5076 wrote to memory of 892 5076 WScript.exe 96 PID 892 wrote to memory of 1864 892 cmd.exe 98 PID 892 wrote to memory of 1864 892 cmd.exe 98 PID 892 wrote to memory of 1864 892 cmd.exe 98 PID 4300 wrote to memory of 4792 4300 exiguvxrrb.mp3 101 PID 4300 wrote to memory of 4792 4300 exiguvxrrb.mp3 101 PID 4300 wrote to memory of 4792 4300 exiguvxrrb.mp3 101 PID 4300 wrote to memory of 4792 4300 exiguvxrrb.mp3 101 PID 4300 wrote to memory of 4792 4300 exiguvxrrb.mp3 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe"C:\Users\Admin\AppData\Local\Temp\e037b1be05a5def69a7692aef31446093ef7c4190215af0a6d742f4724fb1fd3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xcjj.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c exiguvxrrb.mp3 jujqdllgg.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\exiguvxrrb.mp3exiguvxrrb.mp3 jujqdllgg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4792
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD506e80940d07d3fb0ddc093f6b77f9ab7
SHA102315a85b401ab74cc79dc936f821113062b0637
SHA2566d2ece53c2f85cb698afadea456eb04c93863110ff339fb6b34eb243255671c6
SHA5128be14d3212ee4ae9265b6716e704391ad8d3576b4a93fffa1facc441c20a53ae358a87e5367f4e5464f289db0ba548dea9406fd0074695a6c18266f19a8c7b4b
-
Filesize
540B
MD5de178a4a202c9888ed7a208c6a644149
SHA1d4892d8fcec4b1c57eca7223f4bbfb0506fd0d86
SHA25638d4b4ce2be0f554972ffb928dfebb173eff84fc06239378439e2c81a3d984fb
SHA5121843e3ea7c944c5b5b77404450cf7104d5ceb48790b94304f905a2c2af400c42749397e33687f3e4e203fdb1a62b07daa12b113c6377ac1ed085bdc8ee0fc661
-
Filesize
589B
MD543ab8138ddbc9794f1dce0a4ba6a4b77
SHA1f09c85ab35e3cae3bfbeee9ad8a82169112f9430
SHA2565282b99fdf8732d28c18c09e8e511d0ace18bf8beb3f3428fc689c3e4ffafee1
SHA512eefe38bfb89688f3bfe51119a6624c6b73229deedb14c9aed4eca81412117a7f971a64ef0dec85105ab4f1680433b53364652a324e6918c817c719d080b3316a
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
879KB
MD5ba3227a6a7e9aae129c0fb82bb511b95
SHA126985630ffdb7ca1caf18b4dd4edbb52a4c840be
SHA256829d9797e898db11878d79b7588f1efb271c08761a0fbedc00c2ddca1ca1a762
SHA512ee2efe5e06d729c37dda6e6d2d9057008a73a3de7e01698da15f70e606402276897b119b7f370a0ea3afac4ee6e364f423bdde954be210a47978f8c7391622ef
-
Filesize
636B
MD57a4680111fe13184dded5fea94deab57
SHA14d49592817d53f9c5727b64ae51c485c8ce50e2d
SHA25697d2cf558bc2c88fe59361c97d4e0f1effe058507539db2817a22a68408ae539
SHA5125485a1c5f9fafadba68d91a4f87b742f392810c458d783d73646cc46a35074f8ca3b268eb6e7895ee1a6bcddfb9d5251be250c5ded25a57cb0df783641379728
-
Filesize
505B
MD59a7431dbadb74ce902f3badc0522cde9
SHA17de32340b63d9371a6df6ff3f527dd3718494507
SHA2561fe9e5fe9e421a044169446ebdc54d526f7ed7189e14b47425edf28fd0705973
SHA512e531547945bbc137ee0154bee4cec0ad83e7d6349e6492058b13845eab0aa98ff69b54fc02d3ae3d476d5f21f274c156b798733137dbe29469d087c2de706309
-
Filesize
543B
MD53f31479ce20169658fc0bece91baa21b
SHA1ac7a707272f9a133d2e2af767c5bb0dcafb856cc
SHA256f663efea5d17f2f90e06476dd0bd9aad18f5c90b9c6ecd022b7160fca4461157
SHA5120a768f29c6d8b2d1c182620636826b975bae75349e218a18cd2c0718602bd727946dc8840d03b567609f4889927365fd3b28f92d37b4588005e20cfbd24e4a88
-
Filesize
561B
MD5efe9dc4398235606e348de0013613184
SHA1e27eef54f971a81bdc9aea7d9f8c3a84aaa8ec17
SHA2560020a0b64c7d7a95332bdc6543570b22435b9c6527c272fd69482f110cd78c3b
SHA512e7b79ffa520e8b6e642d0db64393a451ded061c212fcd4a187825f5f841ecc16a28b167f653d0b150d368bbe717fa185df24a48acff4b91281da1655d7496b0c
-
Filesize
621B
MD511a0b4476265f1b9bd3bfc3cbcca409a
SHA1ee306624f25b60f575faded8aff91ff6e28b2e9b
SHA25639e19d90cfc180f1111493759da8332a33556e5f740304a8d93ff7eebe5821e0
SHA512ed7b19d4cc6acb124cccecc5d73e4fac8dda1fc8e742bd61a932ce97a7b9ede679ddcbaff3eb43c79137635ecc2a58fdb87eb25e0a7e8ba4e713f76d025538d6
-
Filesize
569B
MD589e312356ee07d906a15cc74b6232498
SHA18e0d8c1dbe8f98fa7a58a24eb06cec1230199591
SHA256a3257e955945f6e1fac689fe2efad79ec9511e54140b550b95f99bc849478205
SHA5121d296d08ea8b0962b6e067e47146746a4c2399868073b6beffbb85c359727aa3f2825e7807bcbdfbf75bcab07521d3eb0567a89c37d011d0088ad3f809cf3e15
-
Filesize
529B
MD5fad42d64e2ba33efc46ae738fb5b0a65
SHA16283fdad73c2e71f01653404a84cb04d6b1e72b6
SHA2561ff4a0f98969d45df0bb6aab8bd32fd9a5db6b2c3311687a6784340fe92deb3b
SHA51207d775a9801c5159b6b8d8c7c99f1dfc7db2757b6c195fef94f919301d4189c3ba99ab2f39e4de578661086bd51bfd9537e6df96b0f15b9532cc67a7f6c0b380
-
Filesize
525B
MD526d1ef03f059035062a953fe56189805
SHA124627042e99874582bf23a3cafbe84488dfddc2d
SHA256df23df9b0925d87f771fe30c4941968a7941d30e61fc095f5858859998e9a3a4
SHA5126373d740a7c2067b8a0f044f9a3b88a699a3024f0b3588efe97804f5ffee8d766737b616646fce37f15446396e82abb8bfb60bb0a5221b1b2f60f5a1e3cee931
-
Filesize
38KB
MD55a16abae8e2e76243cb64e663c433b7c
SHA133603c697a678d7de33337d4cc256823a757e370
SHA2560f3346373c8f156af575a6cf5fddea7a0591e9e98c55911da92c1d0247b42879
SHA512ae7b40466e076e3f5e134c144bcf0387376e8848290d500b1680fd815682a5cffe323385f382d191fc36f77fdc168062d02ea5085c440af95df6c9f21bf8aa58
-
Filesize
38KB
MD54ba1e3dd70b841631605154d0a873e12
SHA13822b13b2cc21b0e6eece2a369ce270711d34f09
SHA256c0463353430c226c83582d11c75816d54dc896e27ca9f6200571c90cbec7d156
SHA512abbaa2045a0eef1daa302e1fb4d241256293f52ade097d4076df7af9d77fe1c881fb21b87bb6b506f965af41b69f8db410c81f6c13688919a193cbd3416a14b5
-
Filesize
516B
MD5640f2177d9892474d0ac242c3667f3ff
SHA1e3de1e8744713f4c8eea3d22810caaf6b98a38d5
SHA2565370805ea5277af13d06cba90923f43f89ce71b307f1a5bc8713078d73fdcfae
SHA512b03300bc6e37b18f80a8028a6ce9efd76bc9d9475fbd3bd1226ef4aa746214254e896fc8ee979e34f0d626317c203e990a938b481c23346ee502e7481f872b60
-
Filesize
562B
MD5ff26772d011d610c7f4bdd0a05401831
SHA1023503721ab26a0266caac724b5ed945c6c44c3d
SHA25678f9d09766359845345936b969282547fba8a5d1a9153eb9f6b7832ca306941e
SHA51221ae9e92426494782594355582ba6c7bbce0fc741ba598570306b3bfc4b74a4df6d8cf18cd8e755230d42133598b9aa5ba2c5b3df94de302505b5649f2c10853
-
Filesize
541B
MD59d2a1420104961db5f6c3acdd78c5413
SHA1aed36a59b5e04e74dba7993108a3036bc0c4841c
SHA25668e829ee0130254050cebb8138bcf651453d4cc85267408c32536e549cd64797
SHA5127cbdf7ace371d7eed837b3a1f4fe3c4cb8a71b423fec30c3fd2868d7dac561c39f7eb15beea94ef67edc782210d3297f610e6e251401e6cbb8b0df6e702e31a2
-
Filesize
547B
MD57f669e5f6c40f60176941426b38c636f
SHA1ba19a13d936e2484091b034dec5a797f82fc0471
SHA256f806baf083a66ee897f8d9df01c94450cc497020fae845aee7a3ad9658de8bb6
SHA5126c021e4af83758c1d4e24537f40499c68499e36deca4bf052f6ad35ed4ebbc7bf7096f38f43478fd21a689cc4330f78662599c39a72ca9bd48ac7d1ab6205c66
-
Filesize
601B
MD574d3eb0b1855cd07983c292bb948d99d
SHA14697ee314d8ebebd7eac6c59a7448a61e409a64f
SHA2562d1e1cb356c1fc8dad4f704f2132e26c9d61aa6807c3663805cb3edffd54309d
SHA512bbd22f507e9c163df6d1c0806e72615d444615bcac0e2c726c40260e76f91ae3168dff74d86435a22c701cb2167e2a555340984608f3e60fd68bd0cc6f3bc7a9
-
Filesize
570B
MD516f8862470abc9bd3d5af4f6458a2c57
SHA1212d077a18d28b73fbf7df9d633159b22e627505
SHA25605b2d07b29ce1f6b110a3bb9232fc05cbd8f46e40318a18496a5c4f882388c4c
SHA512604cbff97d151d314c41e5da9a6ea5f5c8d6514713810e64dd3b085be3e46a6617284af838d5b15da1eeeb2d897528dc20d73b273ca53f9c4d96c3386809f3c7
-
Filesize
588B
MD5fdc0435dee47f452b76364dad3ff3851
SHA12c7e75bc1d2b2eeafaa17c60265d13143eb2a5db
SHA256ef71c9b03d4d8b03f39f052f46b37d89536f35427bce1104913c10da3b9c1fa1
SHA51235693775653fd90add369b4a811d10fe4cb621075347263b09560f0c7bfa93309de737f18a719f2339fd3830b312cc14c18062d2b80abcb74ae3ff57c229d274
-
Filesize
193KB
MD55020f5d94271ef49423393f311102b84
SHA165d7cafb647474b3278700253e453994c8c5c258
SHA256a43c103960d14ddba7698b76852aebde85546b01cb51fd309a05577ca89cb757
SHA5124c10f02f12e81ab055e8b6df8cc64e087be826db89b81ba3b8434f2a3d988d32e4ed5587d7dfc57d809ae75544c0f26462977afff569b7a49bb58bac2c9851bd
-
Filesize
510B
MD56db48d994592c7e89326e10e0534f02e
SHA1aa594bec5eba9cb186c30846c84fbf8d6ce88207
SHA25606e928e3cd0c3e5ba69009535950c5a9f2848f86b68341fadc05cd6d885f3daa
SHA512dcc67b7a13bc1ff78c88fc7ea3f774c57ea68c054cbe1bff9cf89fa412f0502999ebae57d635c28c42f549df04b5590444899910b143b4b1d90540e2642c5b66
-
Filesize
514B
MD5bd4f78f00044397b048515feac7d70f9
SHA14b1b749c5e6cabbee3f24518680302426eee6f5f
SHA2568ff5afb75964a740cddfdde8b059d4ea069ec44d4e11fc70824433a9a1830914
SHA5129f784e1e8f92e599ca9931916e7b909f4b18a4ded43b0712c231ced5351ae2b729f07f258e5d72c4e9f495a6cedf31204e2f1a98d0aa45f21e54f9312b8dee38
-
Filesize
568B
MD59130e3d39ad7a5a96b41bb801ebeb126
SHA185088abd1788bbd886ac37c3a4b4b6f13e2effa3
SHA256e37478a8080c9dc35926872ea64541b112bcd9406e48243c9794f95ce30327e0
SHA512eef4013e76613897c5b13ce536fd26e257b5f3086d80d32a9b77af3cfa90862dc40fbefba3021e4bd3dfb045500c49473b605e1517daf561f5a0e9bf4a3ac786
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b