Overview
overview
10Static
static
1014ed02af2b...e1.exe
windows7-x64
314ed02af2b...e1.exe
windows10-2004-x64
166bcfa4ec...88.exe
windows7-x64
7166bcfa4ec...88.exe
windows10-2004-x64
718f6e53cc2...bc.exe
windows7-x64
318f6e53cc2...bc.exe
windows10-2004-x64
31ecdd2baa0...97.exe
windows7-x64
71ecdd2baa0...97.exe
windows10-2004-x64
7259af5147b...f4.exe
windows7-x64
10259af5147b...f4.exe
windows10-2004-x64
104c8b1c9ed7...16.exe
windows7-x64
34c8b1c9ed7...16.exe
windows10-2004-x64
34cca8b360d...0a.exe
windows7-x64
34cca8b360d...0a.exe
windows10-2004-x64
1057f8e4e1d3...c5.exe
windows7-x64
957f8e4e1d3...c5.exe
windows10-2004-x64
9922cba3477...c3.exe
windows7-x64
3922cba3477...c3.exe
windows10-2004-x64
3b5bd106864...88.exe
windows7-x64
10b5bd106864...88.exe
windows10-2004-x64
10da5f0322d3...24.exe
windows7-x64
7da5f0322d3...24.exe
windows10-2004-x64
8ec7b605aae...33.exe
windows7-x64
7ec7b605aae...33.exe
windows10-2004-x64
9ff70347ce0...0c.exe
windows7-x64
1ff70347ce0...0c.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 08:49
Behavioral task
behavioral1
Sample
14ed02af2bfe80834dd59bd49650f5c982da1a9bf2a437450ce113eb6fcf9ee1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14ed02af2bfe80834dd59bd49650f5c982da1a9bf2a437450ce113eb6fcf9ee1.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
166bcfa4ec03b68bc4ee3fc95806f6d155575be88cbc3c4b7aa5891ca3cc6a88.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
166bcfa4ec03b68bc4ee3fc95806f6d155575be88cbc3c4b7aa5891ca3cc6a88.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
18f6e53cc27bda15c98f79e76f9210bf05b1d8528b96cf4c1523a7aeec7532bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
18f6e53cc27bda15c98f79e76f9210bf05b1d8528b96cf4c1523a7aeec7532bc.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
1ecdd2baa03fa76ba2313ef30be6678fda212eaf2878d8e2b9557ad2aec9f197.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1ecdd2baa03fa76ba2313ef30be6678fda212eaf2878d8e2b9557ad2aec9f197.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
259af5147b99b4c014aeb425aaf236fc76ab60f1aa06efa77027393854e5fff4.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
259af5147b99b4c014aeb425aaf236fc76ab60f1aa06efa77027393854e5fff4.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
57f8e4e1d3339c0abadc0f64fc6a4abaff19cd138724cdbb3fae5f37905547c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
57f8e4e1d3339c0abadc0f64fc6a4abaff19cd138724cdbb3fae5f37905547c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
922cba3477ffa83332622df72c2e580fcb3bdd437952c4b6b2c096b4a094acc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
922cba3477ffa83332622df72c2e580fcb3bdd437952c4b6b2c096b4a094acc3.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
da5f0322d31a05d525ee8b37a748670be35647c692a85fdb8997742f5fed3524.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
da5f0322d31a05d525ee8b37a748670be35647c692a85fdb8997742f5fed3524.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral25
Sample
ff70347ce0294dc6741692164f65608d9bb47e396486c50da08a94a5b3cbe50c.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
ff70347ce0294dc6741692164f65608d9bb47e396486c50da08a94a5b3cbe50c.exe
Resource
win10v2004-20241007-en
General
-
Target
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
-
Size
4.8MB
-
MD5
db497afaaa939e9bd7706520873de8c7
-
SHA1
9a032838d8587bd1e039220bb1bbe28b1c569ea5
-
SHA256
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588
-
SHA512
a872f202d114739d2c8dbcafafdf88191adf6a3df51ab36c595371ab0b0343d3e8a838b07443f58d2d36251de8c027ad46a642317132bb5f088a70842b4f7959
-
SSDEEP
98304:0qwXy+as4+EAF3bgrYIseiqvGyS0Z4VeNzXrCAuO9X2egv+qvDfLdYEnrQtp:0qw1VFkrOeXGt24VezXr1y+4DjdBnEX
Malware Config
Extracted
remcos
RemoteHost
185.42.12.75:2406
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
010325
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
010325-YWFFXL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe -
Executes dropped EXE 2 IoCs
pid Process 1748 iScrPaint.exe 1012 iScrPaint.exe -
Loads dropped DLL 3 IoCs
pid Process 1748 iScrPaint.exe 1012 iScrPaint.exe 4352 WizardManage.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1012 set thread context of 5012 1012 iScrPaint.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iScrPaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WizardManage.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1748 iScrPaint.exe 1012 iScrPaint.exe 1012 iScrPaint.exe 5012 cmd.exe 5012 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1012 iScrPaint.exe 5012 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4352 WizardManage.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1748 1808 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 85 PID 1808 wrote to memory of 1748 1808 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 85 PID 1808 wrote to memory of 1748 1808 b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe 85 PID 1748 wrote to memory of 1012 1748 iScrPaint.exe 87 PID 1748 wrote to memory of 1012 1748 iScrPaint.exe 87 PID 1748 wrote to memory of 1012 1748 iScrPaint.exe 87 PID 1012 wrote to memory of 5012 1012 iScrPaint.exe 88 PID 1012 wrote to memory of 5012 1012 iScrPaint.exe 88 PID 1012 wrote to memory of 5012 1012 iScrPaint.exe 88 PID 1012 wrote to memory of 5012 1012 iScrPaint.exe 88 PID 5012 wrote to memory of 4352 5012 cmd.exe 90 PID 5012 wrote to memory of 4352 5012 cmd.exe 90 PID 5012 wrote to memory of 4352 5012 cmd.exe 90 PID 5012 wrote to memory of 4352 5012 cmd.exe 90 PID 5012 wrote to memory of 4352 5012 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"C:\Users\Admin\AppData\Local\Temp\b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\iScrPaint.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exeC:\Users\Admin\AppData\Roaming\HostdockerMyp_beta\iScrPaint.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\WizardManage.exeC:\Users\Admin\AppData\Local\Temp\WizardManage.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4352
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD56c1f62d8fc49a7537c3690f7c420b89d
SHA129de3dc820b2ee1fbcfe5dfa417fdb5f1a5f3a9c
SHA2565013320be9bc082cf6d9a4cf70929b38fe3ca95f4a6a8393f272d93a4a9966db
SHA512dae8363bb3788b9165c18d638ce44addbb3a901c21b5b3892672ea8ad14cae9fd2fb56c818400c6b658252f9e6ba52534d0e1f09b6cd3c9a88e61386948347fa
-
Filesize
1.8MB
MD5098ac4621ee0e855e0710710736c2955
SHA1ce7b88657c3449d5d05591314aaa43bd3e32bdaa
SHA25646afbf1cbd2e1b5e108c133d4079faddc7347231b0c48566fd967a3070745e7f
SHA5123042785b81bd18b641f0a2b5d8aec8ef86f9bf1269421fb96d1db35a913e744eaff16d9da7a02c8001435d59befb9f26bc0bbfa6e794811abf4282ed68b185fe
-
Filesize
40KB
MD56de7326216218b8195340d815dc75262
SHA1017f3895b98d9ed7ec02bc66945ec37aaed999e0
SHA2563a021200937a56e8dad94ffa8ac24fbbe55d318e64fce36a61efe115f9de3653
SHA5120060c2bf8c47ef5eb23abc4b63c597704501cc1dad2c9977e5e50a42d965ec99b7dcb54f14fbcc472e372f5d707d6bb075ff0e5edd0e72001c7dac58d5eaec57
-
Filesize
1.1MB
MD5c5ded003ddd953a1284dd2cfafd0e632
SHA1b3f974c9a9d035cc1ec990fba3ec5d12c5984073
SHA2563bb40e1fb837a6c138db1aa048c4ecfb51cb91e99e37c6fcbd41fc48b7948d60
SHA512ff7dea3773bebb92a6d92d2051b60fa428fc304ea24dbf66d44a6ae85bef4a1370899423997609eafd973ee8ffeb685ade27af0d42a6cc800aa573dfccc9c6d4
-
Filesize
433KB
MD5fea067901f48a5f1faf7ca3b373f1a8f
SHA1e8abe0deb87de9fe3bb3a611234584e9a9b17cce
SHA256bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152
SHA51207c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023
-
Filesize
1.6MB
MD5fda99bf80b2d459287ae28921eecb8b0
SHA10a1551dacbce87571488875f9e115ab44fc3b308
SHA256d5430e98a7212af879a62f217b411583615cb3a06c316c63cf97e58addfb74f9
SHA51269585c25f0e5fd4a72032d4d514e3152301670664b858f95ce9e467d1c55cc4bdeabe853056fa2ad6f0e71b12a39b20137a3be80e0d395ec3783ad6842b547a6