Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2025, 15:27

General

  • Target

    TELEFONOS DE MEXICO.exe

  • Size

    969KB

  • MD5

    f9538485432d3ec640f89096ba2d4d00

  • SHA1

    b050b847b1fe8be78d56b29bd23c25e05c227a92

  • SHA256

    5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9

  • SHA512

    ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5

  • SSDEEP

    24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz

Malware Config

Extracted

Family

remcos

Botnet

fileooo

C2

188.127.225.33:5637

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    65-VD9T89

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Downloads MZ/PE file 1 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TELEFONOS DE MEXICO.exe
    "C:\Users\Admin\AppData\Local\Temp\TELEFONOS DE MEXICO.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:3468
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
        2⤵
          PID:3436
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
          2⤵
            PID:732
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
            2⤵
              PID:1688
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 12
                3⤵
                • Program crash
                PID:224
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
              2⤵
                PID:2348
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                2⤵
                  PID:4808
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                  2⤵
                    PID:1696
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                    2⤵
                      PID:1680
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 12
                        3⤵
                        • Program crash
                        PID:5096
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                      2⤵
                        PID:3292
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                        2⤵
                          PID:776
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 1680
                        1⤵
                          PID:1244
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1688 -ip 1688
                          1⤵
                            PID:968
                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MDIzQUYyNDktRkFDNS00MUMzLTg2MkMtNTZBQURGOEZGRjI0fSIgdXNlcmlkPSJ7RDkzNkFDREEtQ0IyQy00OTdELTgyOEMtNjQwRjE5OEU4Mzg1fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MzQ5NkE1NkMtODBCMy00M0MzLUJDQkQtRjkwM0I0ODg5ODBBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTc1ODEyMDMwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                            1⤵
                            • System Location Discovery: System Language Discovery
                            • System Network Configuration Discovery: Internet Connection Discovery
                            PID:1896

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/776-23-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/2348-16-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/2980-24-0x00007FF7A9A90000-0x00007FF7A9B88000-memory.dmp

                            Filesize

                            992KB

                          • memory/3292-21-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3436-13-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3436-9-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3436-10-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3468-6-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3468-12-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/3468-4-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-25-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-29-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-1-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-7-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-0-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-2-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-41-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-26-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-27-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-11-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-30-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-31-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-32-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-33-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-36-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4536-40-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB

                          • memory/4808-18-0x0000000000400000-0x0000000000480000-memory.dmp

                            Filesize

                            512KB