Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2025, 13:15 UTC

General

  • Target

    b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe

  • Size

    4.8MB

  • MD5

    db497afaaa939e9bd7706520873de8c7

  • SHA1

    9a032838d8587bd1e039220bb1bbe28b1c569ea5

  • SHA256

    b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588

  • SHA512

    a872f202d114739d2c8dbcafafdf88191adf6a3df51ab36c595371ab0b0343d3e8a838b07443f58d2d36251de8c027ad46a642317132bb5f088a70842b4f7959

  • SSDEEP

    98304:0qwXy+as4+EAF3bgrYIseiqvGyS0Z4VeNzXrCAuO9X2egv+qvDfLdYEnrQtp:0qw1VFkrOeXGt24VezXr1y+4DjdBnEX

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.42.12.75:2406

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    010325

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    010325-YWFFXL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
    "C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exe
        C:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Local\Temp\WizardManage.exe
            C:\Users\Admin\AppData\Local\Temp\WizardManage.exe
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2488

Network

    No results found
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
  • 185.42.12.75:2406
    WizardManage.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5df005be

    Filesize

    1.6MB

    MD5

    1a5d39be0dee1ce98b68771351dbc5b8

    SHA1

    26ae32192555e038b754a2e0bff14b3ceab0fac2

    SHA256

    7263295c5acaa0a35ed8beb04a670d29236b7e7cb9de0863577bcf5d84df66b8

    SHA512

    57609554ee5af3e45762a86d4f5731ffa77d1da4e248b4de354662d622c0cf40c61f731d573db2f6dfdcecfc554ea343b459423d23d6547abc7a4965042f56a2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\WebUI.dll

    Filesize

    7.6MB

    MD5

    6c1f62d8fc49a7537c3690f7c420b89d

    SHA1

    29de3dc820b2ee1fbcfe5dfa417fdb5f1a5f3a9c

    SHA256

    5013320be9bc082cf6d9a4cf70929b38fe3ca95f4a6a8393f272d93a4a9966db

    SHA512

    dae8363bb3788b9165c18d638ce44addbb3a901c21b5b3892672ea8ad14cae9fd2fb56c818400c6b658252f9e6ba52534d0e1f09b6cd3c9a88e61386948347fa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe

    Filesize

    1.8MB

    MD5

    098ac4621ee0e855e0710710736c2955

    SHA1

    ce7b88657c3449d5d05591314aaa43bd3e32bdaa

    SHA256

    46afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f

    SHA512

    3042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lacquey.deb

    Filesize

    40KB

    MD5

    6de7326216218b8195340d815dc75262

    SHA1

    017f3895b98d9ed7ec02bc66945ec37aaed999e0

    SHA256

    3a021200937a56e8dad94ffa8ac24fbbe55d318e64fce36a61efe115f9de3653

    SHA512

    0060c2bf8c47ef5eb23abc4b63c597704501cc1dad2c9977e5e50a42d965ec99b7dcb54f14fbcc472e372f5d707d6bb075ff0e5edd0e72001c7dac58d5eaec57

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\stomatopod.cfg

    Filesize

    1.1MB

    MD5

    c5ded003ddd953a1284dd2cfafd0e632

    SHA1

    b3f974c9a9d035cc1ec990fba3ec5d12c5984073

    SHA256

    3bb40e1fb837a6c138db1aa048c4ecfb51cb91e99e37c6fcbd41fc48b7948d60

    SHA512

    ff7dea3773bebb92a6d92d2051b60fa428fc304ea24dbf66d44a6ae85bef4a1370899423997609eafd973ee8ffeb685ade27af0d42a6cc800aa573dfccc9c6d4

  • C:\Users\Admin\AppData\Local\Temp\WizardManage.exe

    Filesize

    433KB

    MD5

    fea067901f48a5f1faf7ca3b373f1a8f

    SHA1

    e8abe0deb87de9fe3bb3a611234584e9a9b17cce

    SHA256

    bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

    SHA512

    07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

  • memory/2488-75-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-76-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-83-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-82-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-81-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-80-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-79-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-78-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-77-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-74-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-73-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-71-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2488-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2488-67-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2488-70-0x0000000077710000-0x00000000778B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2612-59-0x0000000074DB0000-0x0000000074F24000-memory.dmp

    Filesize

    1.5MB

  • memory/2612-51-0x0000000074DB0000-0x0000000074F24000-memory.dmp

    Filesize

    1.5MB

  • memory/2612-50-0x0000000077710000-0x00000000778B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2624-42-0x0000000074DB0000-0x0000000074F24000-memory.dmp

    Filesize

    1.5MB

  • memory/2624-48-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2624-46-0x0000000074DB0000-0x0000000074F24000-memory.dmp

    Filesize

    1.5MB

  • memory/2624-44-0x0000000074DC3000-0x0000000074DC5000-memory.dmp

    Filesize

    8KB

  • memory/2624-45-0x0000000074DB0000-0x0000000074F24000-memory.dmp

    Filesize

    1.5MB

  • memory/2624-43-0x0000000077710000-0x00000000778B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2756-24-0x0000000077710000-0x00000000778B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2756-23-0x0000000074D90000-0x0000000074F04000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-36-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.