Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe
Resource
win10v2004-20250207-en
General
-
Target
601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe
-
Size
1.1MB
-
MD5
8e49c2e11af1336db053d5062821f5d2
-
SHA1
a4fc1aa3b2d5baf46f042e3eeec5856f20331d9d
-
SHA256
601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52
-
SHA512
d73b796ebd5492bf2acbf606c2a1c7d9eb84b3e4210eb4d47d5186d6161838d6630dc9e167605f9250776f68401a3fb33863944fb217b488d13be4cbdbfe41f2
-
SSDEEP
24576:1u6J33O0c+JY5UZ+XC0kGso6FakCsU4yYhK3x9uZ3WYv:Xu0c++OCvkGs9Fak4BYv
Malware Config
Extracted
remcos
2.2.0 Pro
RemoteHost
185.217.1.142:3337
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-VBI2IL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe -
Remcos family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 48 1368 Process not Found -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation Dxpserver.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation Dxpserver.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation Dxpserver.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation Dxpserver.exe Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation Dxpserver.exe -
Executes dropped EXE 6 IoCs
pid Process 3560 Dxpserver.exe 688 Dxpserver.exe 3800 Dxpserver.exe 2992 Dxpserver.exe 2996 Dxpserver.exe 4092 Dxpserver.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" Dxpserver.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ Dxpserver.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ Dxpserver.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ Dxpserver.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000400000001da55-15.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4008 set thread context of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 3560 set thread context of 688 3560 Dxpserver.exe 94 PID 3800 set thread context of 2992 3800 Dxpserver.exe 105 PID 2996 set thread context of 4092 2996 Dxpserver.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dxpserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 836 MicrosoftEdgeUpdate.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings Dxpserver.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings Dxpserver.exe Key created \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000_Classes\Local Settings Dxpserver.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 1588 schtasks.exe 4592 schtasks.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4008 wrote to memory of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 4008 wrote to memory of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 4008 wrote to memory of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 4008 wrote to memory of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 4008 wrote to memory of 2192 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 86 PID 2192 wrote to memory of 4872 2192 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 88 PID 2192 wrote to memory of 4872 2192 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 88 PID 2192 wrote to memory of 4872 2192 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 88 PID 4008 wrote to memory of 2616 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 91 PID 4008 wrote to memory of 2616 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 91 PID 4008 wrote to memory of 2616 4008 601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe 91 PID 3560 wrote to memory of 688 3560 Dxpserver.exe 94 PID 3560 wrote to memory of 688 3560 Dxpserver.exe 94 PID 3560 wrote to memory of 688 3560 Dxpserver.exe 94 PID 3560 wrote to memory of 688 3560 Dxpserver.exe 94 PID 3560 wrote to memory of 688 3560 Dxpserver.exe 94 PID 688 wrote to memory of 3284 688 Dxpserver.exe 95 PID 688 wrote to memory of 3284 688 Dxpserver.exe 95 PID 688 wrote to memory of 3284 688 Dxpserver.exe 95 PID 3560 wrote to memory of 1588 3560 Dxpserver.exe 98 PID 3560 wrote to memory of 1588 3560 Dxpserver.exe 98 PID 3560 wrote to memory of 1588 3560 Dxpserver.exe 98 PID 3800 wrote to memory of 2992 3800 Dxpserver.exe 105 PID 3800 wrote to memory of 2992 3800 Dxpserver.exe 105 PID 3800 wrote to memory of 2992 3800 Dxpserver.exe 105 PID 3800 wrote to memory of 2992 3800 Dxpserver.exe 105 PID 3800 wrote to memory of 2992 3800 Dxpserver.exe 105 PID 2992 wrote to memory of 2072 2992 Dxpserver.exe 106 PID 2992 wrote to memory of 2072 2992 Dxpserver.exe 106 PID 2992 wrote to memory of 2072 2992 Dxpserver.exe 106 PID 3800 wrote to memory of 4592 3800 Dxpserver.exe 107 PID 3800 wrote to memory of 4592 3800 Dxpserver.exe 107 PID 3800 wrote to memory of 4592 3800 Dxpserver.exe 107 PID 2996 wrote to memory of 4092 2996 Dxpserver.exe 111 PID 2996 wrote to memory of 4092 2996 Dxpserver.exe 111 PID 2996 wrote to memory of 4092 2996 Dxpserver.exe 111 PID 2996 wrote to memory of 4092 2996 Dxpserver.exe 111 PID 2996 wrote to memory of 4092 2996 Dxpserver.exe 111 PID 4092 wrote to memory of 3608 4092 Dxpserver.exe 112 PID 4092 wrote to memory of 3608 4092 Dxpserver.exe 112 PID 4092 wrote to memory of 3608 4092 Dxpserver.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe"C:\Users\Admin\AppData\Local\Temp\601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe"C:\Users\Admin\AppData\Local\Temp\601377399514b0f9957478695dbcd465134026d666affabea442eaac1f607a52.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn cttunesvr /tr "C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exeC:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn cttunesvr /tr "C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1588
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjQ2Mzg3ODUzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:836
-
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exeC:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn cttunesvr /tr "C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4592
-
-
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exeC:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"C:\Users\Admin\AppData\Roaming\adprovider\Dxpserver.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:3608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658B
MD596e663b3e7cb096261e94b510acbc260
SHA1aea0c6f48fe1c66822aafbb7edd092698bc1fbc5
SHA2565c005242253b72020696863fed9e52e8a53b6dc79f25dd32e696da94e8f080a1
SHA51255338b08650a530fd1d9d109f5470472444634cc9920a73372f89240984053e807acada9a93ed272567e0eba41298a0cc4b695e672e4ed915aa28747f080ad08
-
Filesize
564B
MD5e221e7bd7e33aef4a5264f798818142e
SHA13545dbcc35de80c8f15da0daceab80acd0f1ae22
SHA256f37e43a3504c163fa4a82bacc92ceb8cccd37d1020fbba95cc954f316ce49516
SHA51204775d0fa21526bbbaa2deea13af1d5fab6183ea3a2809073539293da78e20f1cf4b9a4afdeafb1b4e8ce17a5be40f44364808ab73c174c98bce53ad8a1807d8
-
Filesize
1.1MB
MD52ed14ae66692c5d8bac5bc926ded2a10
SHA101080e2a6f7dfa6fbd16c7e6111d7e68d1d20202
SHA256be4e51d08479de8cb47c4bba534f4e7f83bf4dd2daa7955efec51ded50d32544
SHA5128846f00e18c216ce00939823f4ba3176329dd5a86146bb13f19fa7947c0cdf8ae8460e9d210f1a2c633614d0d7ea958f253d9da16cd2d1b4907efb054a332d00