Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTO DE ENVÍO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENTO DE ENVÍO.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
vcruntime211.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
vcruntime211.dll
Resource
win10v2004-20250207-en
General
-
Target
libvlc.dll
-
Size
3.9MB
-
MD5
7254a4eeaf6aa5b5b659459f004cc318
-
SHA1
6d1949307a3caf2720e877bffca3693f57e051b6
-
SHA256
a4dd94549a12928ea8eda1308db053d3e2d0e776c8a0c9773f880c98710d8e22
-
SHA512
053b69ed2555cd0b663e2cf39dde193c224bb864ce3a8416182f146ff3d42e56a0fb4e10a72954480e2d13dff142b11c86b5d51c2c5528a43f1a2221956a5d2c
-
SSDEEP
49152:zYYY6YxEjcOBlRTVLFujV0mBpluFWse9R+xhYlzwY:F3tFuCm68
Malware Config
Extracted
remcos
855
23.94.82.22:5890
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
835-S89137
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 55 2568 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1944 set thread context of 3040 1944 rundll32.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4936 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88 PID 1944 wrote to memory of 3040 1944 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libvlc.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1OTY2OTAzODAyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4936