Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 14:15

General

  • Target

    b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe

  • Size

    1.1MB

  • MD5

    1a9f017e35766201caca66b99c8700eb

  • SHA1

    c276dd064641b832dfdf4886267526c827251467

  • SHA256

    b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd

  • SHA512

    ebe846e24f247bda738c4c6b31e1328210becc9233262ed25955e3dc627a0a251851add60db743c9eb507fb9c337fc69308e64117313f833da0e921a5f51e734

  • SSDEEP

    24576:tqv1KmEM2KM1NJL09EkhupPKRmtgAV189rYYDk4CvM:4v1KmEXKM1jGhwKstpVy9cYApvM

Malware Config

Extracted

Family

remcos

Botnet

CocoHost

C2

87.120.115.189:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-Y1QVDD

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    true

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe
    "C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2808
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\peyoVuqfV.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\peyoVuqfV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3034.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1500
      • \??\c:\program files (x86)\internet explorer\iexplore.exe
        "c:\program files (x86)\internet explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1868
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

    Filesize

    252B

    MD5

    27ef887d47311f53626b05ae49ddacf6

    SHA1

    d119df9dd369a8e0507ee8b9394bd2c0ffd0d479

    SHA256

    5f87b80bb1112a67747c134b08908eef17c04d4360f179dbd1c371bdca41aa54

    SHA512

    92e9357261c66d9e22995dcd6880833eea386ea788218c28edc78cb4b6d14bed2682c9a311d6c4be1dd57ed1323d84a1e15bf6d051fc9d061edfe5db245ffdb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbd55e22b48f354250ccbd4e98ab056c

    SHA1

    c6e6b14a59ceaa1d0eea9e3b52a43b100a21bfd6

    SHA256

    684f1e51a0e94d52aef73d7d24f4b4181dbbab5e364e4aeb3d389eb0aea1c1be

    SHA512

    fd76541e3ec6ad9cea2cf1f1b331e8fa47ded9d0eca30c39bd9c399121d9092caa7d7ba6303de48953c97abbbfe060d59ef5836b54c2e9da7f14829a2048416a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ecc79a04d8655df29155fa01a3ac910

    SHA1

    ad139eed5048ebcf4b9ed604cc4808618825a208

    SHA256

    31ec254c9f81546a5324654fedcdebc9c55bb47d0f71fe3fa77e8006d1de2f94

    SHA512

    311822f4ee621fd1260223803f8fe903178f7ce43ff9832619069189757591e31d0ae2b6e058fd48c7f2a459b4e128b2d37c46d8f03fdcc9808777fc0f96432d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d24ac3b00b4c37035aefcad1d7f554e

    SHA1

    96c28cc4449c32c61972f7039c1dfbefc7cb88cc

    SHA256

    fe1fbe96a005e1692284ba2e44b83a854b45a72bff2279a4c4ac16d787c4e3b9

    SHA512

    f1a0f372a64987c1092c7b1ffde6b99cfc0769b47269315b5dc2b51f5b5a85d813857e148652d87c92db35954c7b9a42a0587b15bf5a423f41ad8fdef203cd5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    722539a9c1185082b9826dce42b0bc17

    SHA1

    93b8b23c8a3567d967b0042c5d9ff7647edb9369

    SHA256

    b4afe2fd3ed286c8eb003d7306d5f7f67d04b9ee08e9195f18404532bbbb0716

    SHA512

    678419fa98db8621a83a3f2e7263b39107fad4dc25c7321dfe1dc1c819d142f9f795969bf228e23c6f3ef88f8d98046e37dfbbffa4fbb412aab91b34bd810bfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34be0847abef934beb2b8e75f15bfc09

    SHA1

    989c6e4572b1a841ae864831382e672c156859b5

    SHA256

    29f8506bc4ea7bad3a8a90e6e6e2a45a789494dc671635e40144c532b016b358

    SHA512

    923bd3b8c86a255a817a50267b564f2f45ce651004609f8f6f59650327e112ead5b4ec913d65ddf535d2d13a047ad6de8281d41defab8d188b3c43576cad604a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    807e3916473b8bb7a2a037052aa7289c

    SHA1

    5d4c7680b35cc30a7c632db6dadb3e90eba3578d

    SHA256

    bdfbbec70a24954ae009a62ce54567ccc9e7564252f6d4c28bb6bf64973eb799

    SHA512

    0a485033fb30a4d9b2b55ab4e49e2b95181d139929e4a221c95c269052e6144dd672337e86e8c844dd3180a7660d9df184bc255798d3fc48926784a661c15951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    070118bc55733cb234d73ce6a14b37df

    SHA1

    53d50ea5f8640421e968633905a56113f14aedb6

    SHA256

    ce3a818a6e7f8c1d1d0a621d495408eb07020215d617af0aa695f75173473eef

    SHA512

    78ad2ed8e937295bd55dc8d53a7bbe08cd070fd36c66d255a2911f6c7e4b788b750da8512b613efed26ba0fa6f7a2aa20cd86feaf7d980b88ca1c51a3df97b14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e4bc1f7d8f6b1daa9dcca3912d8c8f7

    SHA1

    964afaf9073c74639000648a501be8d715c39432

    SHA256

    c101446d84ecc4dab3013033807909a37833edf0189fa60426b6c8aad47f74e2

    SHA512

    01df2249b5e650af72bf18185b0524d872c8b2be7e7f16421d0059a5328b7f438c339161dba3c0361acd189d7ec59e1b18c4fabede9b4638d3fbcc5fdfe3b6c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfdaeaddb050011c6cf0c511188282a1

    SHA1

    17935d09104ec6c9ad7ecd9af19e590f4b80b548

    SHA256

    6f1a9cfb4953ef12c120b4b1098d6980ae40123693ae24b80db9584950b8e7cb

    SHA512

    d2742b98f1ca5b31af92ff8bdf436d79a9cea5ada10a7fa1539de465d670094735d9445d93efb5125218fec8593777b7baf2de4d85952f6c8812314237325ed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31cc1d461fb8f6edf525fa23b0735576

    SHA1

    d7424219e9dc6afb6b5051e7b08d8e2821b6df31

    SHA256

    cd43e4c24d74ec481673ee65f7d96ce92caefc82f60f141d743001aa50953774

    SHA512

    01e8ca9fcc1182c156e84f976b2ef292512a50b24b08323c58bfbb5e2e8dcb4777b5737999966d075f02be55d4cfaed57266bb7aa15d79961eb2b061e239779c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7f61ae298ba8e9ab2d190d3cd456561

    SHA1

    129c6ba0c787e5ed69fc6abbe92b76fb61e5fd1e

    SHA256

    7b6d9402a29a9ed1aff7bbe04705c6b25734d9373ab370dcafee49b15a88fb13

    SHA512

    35a69e186e0857a663ac46a379fcc907dc971a3505b17f64c0319c6fcc09e0a977d17a815aac0ff9c92eddb59a294a76341fc0645ecb440dd302c2047a000269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0677eb69bed7c8d772c9d0e746fec6ef

    SHA1

    750d4cf82f336ba0bd4296d5828697594ac1dd0f

    SHA256

    3a048c80285154bc57b8ba048b182e5009257484e3b25c297e83bfa2ab3b292b

    SHA512

    d7c8aaaa505ebd5aa9e0123749a382c6d057fba4b792f671ff25196b5adab716d5c01e80d40a64d810a16d5afd5cad63c17004658a1966b3a579f201f000e39e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c7a20427dccf5c1705b04abd2718901

    SHA1

    9c703906947930e673afebfb9915785c5da5a126

    SHA256

    af477a44aca87d73ee0fbc09c61d8e4a78d887fd71cce2c5e2b8b41eb5390c91

    SHA512

    70454c5eaffc4b03c4930ad63608988cb68120e05b375fa0d0aaa9268d6d1c228c2dd9cbe89af43cc557cf94a191cf668368de1a4a24752fc590309f7fca215d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fb440c7d74faa17044dca6d8672744b

    SHA1

    4cad8730f8c6fd0294600f280882a14c292af60a

    SHA256

    1f0439b0100681210d2334e8f93c04ef2da7b5a564b5707147d26bd086cf41b4

    SHA512

    1b7becfdfeb368d94509c261cbb158155e3b5daad14d18a0cb4295a3e5497f13e3db453e3e87081ed50b402ed50b9845c8e3eeef81276b7412b5ca139b2e0529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc860d73c8277af8a082ac6dd13492af

    SHA1

    c157f98dd1aed4baafed06b76ca097607b3e3099

    SHA256

    0a9fc727c21ec367e79abfbc61c69aa25e0bf9be537dcfa67d472fe4044591a3

    SHA512

    ad0651eccf1256c06d87cf2d248a7c822c11e524ae380da96e7dbe38b9ed49fb9693bd025eb040e45cb1fa07bf8206058b95177941194b75ec240bfbaabcd7e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58e023982b2b9a7bd920f0d3205bbb08

    SHA1

    b74e680312fa7138205d5f17e2c4cd0ca61828cc

    SHA256

    cb237609175220765f9c299f6c162594be3de27bcc541d03094399281201f4ac

    SHA512

    fb9c29c8440e19c87d57ce9cf21f064957cf0e8f2b932d8598ef9386a4087cba5743a1e9dd02c0673ab0cf3a300a94c5169ce2351acf4b78a1417eef48834788

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9294246d1a8442741513d8adc3d8528

    SHA1

    7df243a411494ea0636493555110ea855a5bc601

    SHA256

    ea317ae17ea9a0e8f85c9e8e952c3815cdad66e8819f9aa6aa0c6cfd8ca2f9a2

    SHA512

    cdf0ee1b6b62e40bb14c29c18ea0c0f16de40bed030b8585a5f7c53f87e40f0b5572501fb81ada017462c4ed6f5a42eba7888da79090a37147f961ca7652f3b6

  • C:\Users\Admin\AppData\Local\Temp\Cab6328.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar634A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp3034.tmp

    Filesize

    1KB

    MD5

    af4a6b74e1000ea5acf3862a73a62ec5

    SHA1

    55edb23941ddc42d334cc16be1feecc5c281ff36

    SHA256

    8178afc5882962bedd49867236f76bd4c35477f6451aad0ff5355f80767252ad

    SHA512

    8bd58da9d92a9a6d68ad4de780e37eee0d5915356fe1d12cf52aef762da4e972d2293f8146b61ecabf5f7c3d7bedfa4ad3f645a5f32d51063adbc6d15d85cb83

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    c7be533ec387d5caae72030ab0c83021

    SHA1

    82d5ce4fad51bda20027cf5bbf94c81dd58bf767

    SHA256

    be947f7eca2acf15424f15bb327c406794d60f484b29c64a4c06fcc3e65fd7ae

    SHA512

    81e502146c77022754b36c3d9e7d1831d15c57395e316f60f507177a3d3d28d8179ff680ab3391c0e7829b4ed96cc8d98db83fa20852ccb9d070893e6438a18b

  • memory/1500-21-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-23-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-27-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-32-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-33-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-30-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-25-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1500-31-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1500-19-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2104-35-0x0000000000080000-0x00000000000C0000-memory.dmp

    Filesize

    256KB

  • memory/2104-37-0x0000000000080000-0x00000000000C0000-memory.dmp

    Filesize

    256KB

  • memory/2104-38-0x0000000000080000-0x00000000000C0000-memory.dmp

    Filesize

    256KB

  • memory/2104-34-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2984-36-0x00000000740B0000-0x000000007479E000-memory.dmp

    Filesize

    6.9MB

  • memory/2984-0-0x00000000740BE000-0x00000000740BF000-memory.dmp

    Filesize

    4KB

  • memory/2984-6-0x0000000001F20000-0x0000000001FE4000-memory.dmp

    Filesize

    784KB

  • memory/2984-5-0x00000000740B0000-0x000000007479E000-memory.dmp

    Filesize

    6.9MB

  • memory/2984-4-0x00000000740BE000-0x00000000740BF000-memory.dmp

    Filesize

    4KB

  • memory/2984-3-0x0000000000470000-0x000000000048E000-memory.dmp

    Filesize

    120KB

  • memory/2984-2-0x00000000740B0000-0x000000007479E000-memory.dmp

    Filesize

    6.9MB

  • memory/2984-1-0x0000000000A00000-0x0000000000B1E000-memory.dmp

    Filesize

    1.1MB