Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2025, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
TELEFONOS DE MEXICO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TELEFONOS DE MEXICO.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
vcruntime211.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
vcruntime211.dll
Resource
win10v2004-20250207-en
General
-
Target
TELEFONOS DE MEXICO.exe
-
Size
969KB
-
MD5
f9538485432d3ec640f89096ba2d4d00
-
SHA1
b050b847b1fe8be78d56b29bd23c25e05c227a92
-
SHA256
5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
-
SHA512
ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
SSDEEP
24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz
Malware Config
Extracted
remcos
fileooo
188.127.225.33:5637
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
65-VD9T89
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 57 2860 Process not Found -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2980 set thread context of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 set thread context of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 set thread context of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 set thread context of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 set thread context of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 set thread context of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 set thread context of 1680 2980 TELEFONOS DE MEXICO.exe 95 PID 2980 set thread context of 3292 2980 TELEFONOS DE MEXICO.exe 96 PID 2980 set thread context of 776 2980 TELEFONOS DE MEXICO.exe 97 -
Program crash 2 IoCs
pid pid_target Process procid_target 5096 1680 WerFault.exe 95 224 1688 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1896 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 4536 2980 TELEFONOS DE MEXICO.exe 86 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3468 2980 TELEFONOS DE MEXICO.exe 87 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 3436 2980 TELEFONOS DE MEXICO.exe 88 PID 2980 wrote to memory of 732 2980 TELEFONOS DE MEXICO.exe 89 PID 2980 wrote to memory of 732 2980 TELEFONOS DE MEXICO.exe 89 PID 2980 wrote to memory of 732 2980 TELEFONOS DE MEXICO.exe 89 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 1688 2980 TELEFONOS DE MEXICO.exe 90 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 2348 2980 TELEFONOS DE MEXICO.exe 91 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 4808 2980 TELEFONOS DE MEXICO.exe 93 PID 2980 wrote to memory of 1696 2980 TELEFONOS DE MEXICO.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\TELEFONOS DE MEXICO.exe"C:\Users\Admin\AppData\Local\Temp\TELEFONOS DE MEXICO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:3468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:3436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 123⤵
- Program crash
PID:224
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:2348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:4808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:1696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 123⤵
- Program crash
PID:5096
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:3292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵PID:776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 16801⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1688 -ip 16881⤵PID:968
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTc1ODEyMDMwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1896