Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 08:48

General

  • Target

    new.exe

  • Size

    1.4MB

  • MD5

    9549b9ff42af2fdd1943a1cb5e41baff

  • SHA1

    bf30c30071ea553e0bc2a01aa2ebad1d2cef8868

  • SHA256

    f0890236561509ebdba4da6afbd92c6684a454c80edecba802f7e72cdfa6db6b

  • SHA512

    1ce8671893d354b5ec340ef03ad5583216e1d1a6191442fd5368a353d2515810afdb5dee2f29801e018de6736c0667fee6ec1961e7af04b3e6ab66346c30aaca

  • SSDEEP

    24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8aLxnmUItiv3cXziE1ToL8X/6P:KTvC/MTQYxsWR7aLxnmUj/Oz72Av

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.3.64.152:2559

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-EPD71P

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\new.exe
    "C:\Users\Admin\AppData\Local\Temp\new.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\directory\chrome.exe
      "C:\Users\Admin\AppData\Local\Temp\new.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\directory\chrome.exe
        "C:\Users\Admin\AppData\Local\directory\chrome.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\ProgramData\Remcos\remcos.exe
          "C:\ProgramData\Remcos\remcos.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dalis

    Filesize

    192KB

    MD5

    c96f916d20dcaad773969db9d24bf1be

    SHA1

    efa4e89b4ea946555337a852c6c2c09ca0b21fa3

    SHA256

    3caedbcb0dfd951e4bc70df892291c3a0cc0c0f61e07a8fdca51c672eca07f5e

    SHA512

    0b6dfb1258ba8e62f0d11c9835b35cd9985f7a40f67c219572c48dfa40b0c8074051b068bc905827844cc20523cda9c8795e5890e032b0440a507e74abd04a1c

  • C:\Users\Admin\AppData\Local\Temp\Dalis

    Filesize

    483KB

    MD5

    a34be9ea8580f708ad9968c443210cca

    SHA1

    8ccb6a23472c83acd9d70ffc2c50410fa838b119

    SHA256

    f58769047375e958921933cfb3763c0ab1e3171b577f1b4ed519685064997424

    SHA512

    22a7a24cc2fb62ce7ecccde2a110e77ef12b38da801d297f1cdaf2764d3529ce5175378d8debcf6fd468909578aab2b1cf5bc0f03fed57c484514f63d142a890

  • C:\Users\Admin\AppData\Local\Temp\Gehman

    Filesize

    84KB

    MD5

    c8d4b14b9e0ddee2c651317473410eae

    SHA1

    bb5205bfeca473a57894e8498c02897d619b7a83

    SHA256

    f4ee6ff1f55b128ad21a50d74ba2d29c4030439e5e1a0b6addb7a2aa32d675ce

    SHA512

    cbdeca79b15d75ae0860215bc3329ccd1ecd9587e58640160ce6c3329047f0a31258ceb1567111b69cf0df7e3c0fb7f41dee5c4fa337a2254cc1e122fee34125

  • C:\Users\Admin\AppData\Local\Temp\aut9A1D.tmp

    Filesize

    407KB

    MD5

    d2f208eaa0db50f7f4d58d343eb7f641

    SHA1

    dd1711fdc533ef8d597a4b9844323ccf0d83d5c2

    SHA256

    437d7d5c8bf860e33b1a6b93e139433f17d82f24ee1e89352ae4bcf571c267d1

    SHA512

    a640352082d69daee0ebe10e46432f77fcfd2a7accb3447e54c2eac2d7b6d36fe1f3b48af1deb5401abebc39a6a6b60a070f7a0f1ef06e9f4b2b7b71b3f4470e

  • C:\Users\Admin\AppData\Local\Temp\aut9A3D.tmp

    Filesize

    42KB

    MD5

    9759246f068c11cf1caa5f553b94dee2

    SHA1

    6556e0febfbf1b08c2b98f01cd4670baffa0f359

    SHA256

    2ea2e726d82609c1a28d5200c46a52c8fc9612496e4e4c71f09c658868962748

    SHA512

    cee5ee112d2c8b98b472388f147496ac4b0cbd3b71f7ad2532b84b78284f16459510511d8291511de766081654c91d62de794590930a2ef02caeae2860c2e045

  • C:\Users\Admin\AppData\Local\directory\chrome.exe

    Filesize

    1.4MB

    MD5

    9549b9ff42af2fdd1943a1cb5e41baff

    SHA1

    bf30c30071ea553e0bc2a01aa2ebad1d2cef8868

    SHA256

    f0890236561509ebdba4da6afbd92c6684a454c80edecba802f7e72cdfa6db6b

    SHA512

    1ce8671893d354b5ec340ef03ad5583216e1d1a6191442fd5368a353d2515810afdb5dee2f29801e018de6736c0667fee6ec1961e7af04b3e6ab66346c30aaca

  • memory/1732-11-0x0000000001540000-0x0000000001544000-memory.dmp

    Filesize

    16KB

  • memory/2264-44-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2264-55-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-72-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-77-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-70-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-73-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-74-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-75-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-76-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-71-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-78-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-79-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-80-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-81-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-82-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2320-83-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB