Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 08:48
Static task
static1
Behavioral task
behavioral1
Sample
new.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
new.exe
Resource
win10v2004-20250129-en
General
-
Target
new.exe
-
Size
1.4MB
-
MD5
9549b9ff42af2fdd1943a1cb5e41baff
-
SHA1
bf30c30071ea553e0bc2a01aa2ebad1d2cef8868
-
SHA256
f0890236561509ebdba4da6afbd92c6684a454c80edecba802f7e72cdfa6db6b
-
SHA512
1ce8671893d354b5ec340ef03ad5583216e1d1a6191442fd5368a353d2515810afdb5dee2f29801e018de6736c0667fee6ec1961e7af04b3e6ab66346c30aaca
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8aLxnmUItiv3cXziE1ToL8X/6P:KTvC/MTQYxsWR7aLxnmUj/Oz72Av
Malware Config
Extracted
remcos
RemoteHost
192.3.64.152:2559
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-EPD71P
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\Control Panel\International\Geo\Nation chrome.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.vbs chrome.exe -
Executes dropped EXE 3 IoCs
pid Process 2868 chrome.exe 2264 chrome.exe 2320 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-EPD71P = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-EPD71P = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-805940606-1861219160-370298170-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-EPD71P = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-EPD71P = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b40-14.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1732 new.exe 1732 new.exe 2868 chrome.exe 2868 chrome.exe 2264 chrome.exe 2264 chrome.exe 2320 remcos.exe 2320 remcos.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1732 new.exe 1732 new.exe 2868 chrome.exe 2868 chrome.exe 2264 chrome.exe 2264 chrome.exe 2320 remcos.exe 2320 remcos.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2868 1732 new.exe 86 PID 1732 wrote to memory of 2868 1732 new.exe 86 PID 1732 wrote to memory of 2868 1732 new.exe 86 PID 2868 wrote to memory of 2264 2868 chrome.exe 88 PID 2868 wrote to memory of 2264 2868 chrome.exe 88 PID 2868 wrote to memory of 2264 2868 chrome.exe 88 PID 2264 wrote to memory of 2320 2264 chrome.exe 90 PID 2264 wrote to memory of 2320 2264 chrome.exe 90 PID 2264 wrote to memory of 2320 2264 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\new.exe"C:\Users\Admin\AppData\Local\Temp\new.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\directory\chrome.exe"C:\Users\Admin\AppData\Local\Temp\new.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\directory\chrome.exe"C:\Users\Admin\AppData\Local\directory\chrome.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5c96f916d20dcaad773969db9d24bf1be
SHA1efa4e89b4ea946555337a852c6c2c09ca0b21fa3
SHA2563caedbcb0dfd951e4bc70df892291c3a0cc0c0f61e07a8fdca51c672eca07f5e
SHA5120b6dfb1258ba8e62f0d11c9835b35cd9985f7a40f67c219572c48dfa40b0c8074051b068bc905827844cc20523cda9c8795e5890e032b0440a507e74abd04a1c
-
Filesize
483KB
MD5a34be9ea8580f708ad9968c443210cca
SHA18ccb6a23472c83acd9d70ffc2c50410fa838b119
SHA256f58769047375e958921933cfb3763c0ab1e3171b577f1b4ed519685064997424
SHA51222a7a24cc2fb62ce7ecccde2a110e77ef12b38da801d297f1cdaf2764d3529ce5175378d8debcf6fd468909578aab2b1cf5bc0f03fed57c484514f63d142a890
-
Filesize
84KB
MD5c8d4b14b9e0ddee2c651317473410eae
SHA1bb5205bfeca473a57894e8498c02897d619b7a83
SHA256f4ee6ff1f55b128ad21a50d74ba2d29c4030439e5e1a0b6addb7a2aa32d675ce
SHA512cbdeca79b15d75ae0860215bc3329ccd1ecd9587e58640160ce6c3329047f0a31258ceb1567111b69cf0df7e3c0fb7f41dee5c4fa337a2254cc1e122fee34125
-
Filesize
407KB
MD5d2f208eaa0db50f7f4d58d343eb7f641
SHA1dd1711fdc533ef8d597a4b9844323ccf0d83d5c2
SHA256437d7d5c8bf860e33b1a6b93e139433f17d82f24ee1e89352ae4bcf571c267d1
SHA512a640352082d69daee0ebe10e46432f77fcfd2a7accb3447e54c2eac2d7b6d36fe1f3b48af1deb5401abebc39a6a6b60a070f7a0f1ef06e9f4b2b7b71b3f4470e
-
Filesize
42KB
MD59759246f068c11cf1caa5f553b94dee2
SHA16556e0febfbf1b08c2b98f01cd4670baffa0f359
SHA2562ea2e726d82609c1a28d5200c46a52c8fc9612496e4e4c71f09c658868962748
SHA512cee5ee112d2c8b98b472388f147496ac4b0cbd3b71f7ad2532b84b78284f16459510511d8291511de766081654c91d62de794590930a2ef02caeae2860c2e045
-
Filesize
1.4MB
MD59549b9ff42af2fdd1943a1cb5e41baff
SHA1bf30c30071ea553e0bc2a01aa2ebad1d2cef8868
SHA256f0890236561509ebdba4da6afbd92c6684a454c80edecba802f7e72cdfa6db6b
SHA5121ce8671893d354b5ec340ef03ad5583216e1d1a6191442fd5368a353d2515810afdb5dee2f29801e018de6736c0667fee6ec1961e7af04b3e6ab66346c30aaca