Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 13:15
Static task
static1
Behavioral task
behavioral1
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win10v2004-20241007-en
General
-
Target
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
-
Size
4.8MB
-
MD5
db497afaaa939e9bd7706520873de8c7
-
SHA1
9a032838d8587bd1e039220bb1bbe28b1c569ea5
-
SHA256
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588
-
SHA512
a872f202d114739d2c8dbcafafdf88191adf6a3df51ab36c595371ab0b0343d3e8a838b07443f58d2d36251de8c027ad46a642317132bb5f088a70842b4f7959
-
SSDEEP
98304:0qwXy+as4+EAF3bgrYIseiqvGyS0Z4VeNzXrCAuO9X2egv+qvDfLdYEnrQtp:0qw1VFkrOeXGt24VezXr1y+4DjdBnEX
Malware Config
Extracted
remcos
RemoteHost
185.42.12.75:2406
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
010325
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
010325-YWFFXL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe -
Executes dropped EXE 2 IoCs
pid Process 4648 iScrPaint.exe 920 iScrPaint.exe -
Loads dropped DLL 3 IoCs
pid Process 4648 iScrPaint.exe 920 iScrPaint.exe 4960 WizardManage.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 920 set thread context of 4780 920 iScrPaint.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WizardManage.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4648 iScrPaint.exe 920 iScrPaint.exe 920 iScrPaint.exe 4780 cmd.exe 4780 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 920 iScrPaint.exe 4780 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 WizardManage.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4648 1644 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 82 PID 1644 wrote to memory of 4648 1644 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 82 PID 1644 wrote to memory of 4648 1644 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 82 PID 4648 wrote to memory of 920 4648 iScrPaint.exe 84 PID 4648 wrote to memory of 920 4648 iScrPaint.exe 84 PID 4648 wrote to memory of 920 4648 iScrPaint.exe 84 PID 920 wrote to memory of 4780 920 iScrPaint.exe 85 PID 920 wrote to memory of 4780 920 iScrPaint.exe 85 PID 920 wrote to memory of 4780 920 iScrPaint.exe 85 PID 920 wrote to memory of 4780 920 iScrPaint.exe 85 PID 4780 wrote to memory of 4960 4780 cmd.exe 94 PID 4780 wrote to memory of 4960 4780 cmd.exe 94 PID 4780 wrote to memory of 4960 4780 cmd.exe 94 PID 4780 wrote to memory of 4960 4780 cmd.exe 94 PID 4780 wrote to memory of 4960 4780 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exeC:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\WizardManage.exeC:\Users\Admin\AppData\Local\Temp\WizardManage.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4960
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD512b66d9895b2ca06ee6519f55bd3b749
SHA1f7084ccfc45ad3fe893b1d24612ec00a2b60aa14
SHA2569fdab426b5aabd827731510becea1819db84d281e8979d60d22bc49f96fab1c4
SHA512361b7d33b681fe63a47cfd74894aed57f8a19e8a3652776e761ca62303bfd7c19382118b8531ce017a97d2800ab43a96f398cd5d33e157467f3138e002145ee4
-
Filesize
7.6MB
MD56c1f62d8fc49a7537c3690f7c420b89d
SHA129de3dc820b2ee1fbcfe5dfa417fdb5f1a5f3a9c
SHA2565013320be9bc082cf6d9a4cf70929b38fe3ca95f4a6a8393f272d93a4a9966db
SHA512dae8363bb3788b9165c18d638ce44addbb3a901c21b5b3892672ea8ad14cae9fd2fb56c818400c6b658252f9e6ba52534d0e1f09b6cd3c9a88e61386948347fa
-
Filesize
1.8MB
MD5098ac4621ee0e855e0710710736c2955
SHA1ce7b88657c3449d5d05591314aaa43bd3e32bdaa
SHA25646afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
SHA5123042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
Filesize
40KB
MD56de7326216218b8195340d815dc75262
SHA1017f3895b98d9ed7ec02bc66945ec37aaed999e0
SHA2563a021200937a56e8dad94ffa8ac24fbbe55d318e64fce36a61efe115f9de3653
SHA5120060c2bf8c47ef5eb23abc4b63c597704501cc1dad2c9977e5e50a42d965ec99b7dcb54f14fbcc472e372f5d707d6bb075ff0e5edd0e72001c7dac58d5eaec57
-
Filesize
1.1MB
MD5c5ded003ddd953a1284dd2cfafd0e632
SHA1b3f974c9a9d035cc1ec990fba3ec5d12c5984073
SHA2563bb40e1fb837a6c138db1aa048c4ecfb51cb91e99e37c6fcbd41fc48b7948d60
SHA512ff7dea3773bebb92a6d92d2051b60fa428fc304ea24dbf66d44a6ae85bef4a1370899423997609eafd973ee8ffeb685ade27af0d42a6cc800aa573dfccc9c6d4
-
Filesize
433KB
MD5fea067901f48a5f1faf7ca3b373f1a8f
SHA1e8abe0deb87de9fe3bb3a611234584e9a9b17cce
SHA256bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152
SHA51207c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023