Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
Edgeviewwebs.exe
Resource
win7-20241010-en
General
-
Target
Edgeviewwebs.exe
-
Size
2.5MB
-
MD5
00c1daf7a4eb037fe33278fe676663ea
-
SHA1
d39aeaf8b76b6176109958653db7dbd64fa69882
-
SHA256
63c6397f3431639ee54b68cf2837024862d699ccdc41cddf64058be91ae0b87e
-
SHA512
5824bff18621563fb94bfef2742b922e5bb32d09a5b6b44415e67104dd59552b94e977b2ce3ea608728c721bd96fa256bf89f6b5892290a1346c8eee532391c1
-
SSDEEP
49152:cTuaAhwBhBtt49Y5t/RaSuCALkusLGZOC6c/EHXEAFJzQyMN/:cKaAh0y252SuC6kusCZjY3EAzzG/
Malware Config
Extracted
remcos
6.1.0 Light
Edgeweb
72.5.42.161:6666
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Edg-G6MPI6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 2816 cmd.exe 5 2816 cmd.exe 6 2816 cmd.exe 7 2816 cmd.exe 8 2816 cmd.exe 9 2816 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2240 Edgeviewwebs.exe 2900 TurboActivate.exe 2996 TurboActivate.exe -
Loads dropped DLL 7 IoCs
pid Process 2248 Edgeviewwebs.exe 2240 Edgeviewwebs.exe 2240 Edgeviewwebs.exe 2900 TurboActivate.exe 2900 TurboActivate.exe 2996 TurboActivate.exe 2616 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2996 set thread context of 2616 2996 TurboActivate.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edgeviewwebs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edgeviewwebs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TurboActivate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TurboActivate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2900 TurboActivate.exe 2996 TurboActivate.exe 2996 TurboActivate.exe 2996 TurboActivate.exe 2616 cmd.exe 2616 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2996 TurboActivate.exe 2616 cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2240 2248 Edgeviewwebs.exe 30 PID 2248 wrote to memory of 2240 2248 Edgeviewwebs.exe 30 PID 2248 wrote to memory of 2240 2248 Edgeviewwebs.exe 30 PID 2248 wrote to memory of 2240 2248 Edgeviewwebs.exe 30 PID 2240 wrote to memory of 2900 2240 Edgeviewwebs.exe 31 PID 2240 wrote to memory of 2900 2240 Edgeviewwebs.exe 31 PID 2240 wrote to memory of 2900 2240 Edgeviewwebs.exe 31 PID 2240 wrote to memory of 2900 2240 Edgeviewwebs.exe 31 PID 2900 wrote to memory of 2996 2900 TurboActivate.exe 32 PID 2900 wrote to memory of 2996 2900 TurboActivate.exe 32 PID 2900 wrote to memory of 2996 2900 TurboActivate.exe 32 PID 2900 wrote to memory of 2996 2900 TurboActivate.exe 32 PID 2996 wrote to memory of 2616 2996 TurboActivate.exe 33 PID 2996 wrote to memory of 2616 2996 TurboActivate.exe 33 PID 2996 wrote to memory of 2616 2996 TurboActivate.exe 33 PID 2996 wrote to memory of 2616 2996 TurboActivate.exe 33 PID 2996 wrote to memory of 2616 2996 TurboActivate.exe 33 PID 2616 wrote to memory of 2816 2616 cmd.exe 35 PID 2616 wrote to memory of 2816 2616 cmd.exe 35 PID 2616 wrote to memory of 2816 2616 cmd.exe 35 PID 2616 wrote to memory of 2816 2616 cmd.exe 35 PID 2616 wrote to memory of 2816 2616 cmd.exe 35 PID 2616 wrote to memory of 2816 2616 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe"C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\TEMP\{58DAFBD1-DDA9-4592-9F24-8D2C4B2B178E}\.cr\Edgeviewwebs.exe"C:\Windows\TEMP\{58DAFBD1-DDA9-4592-9F24-8D2C4B2B178E}\.cr\Edgeviewwebs.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe" -burn.filehandle.attached=216 -burn.filehandle.self=2122⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.exeC:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\CJRMake_test\TurboActivate.exeC:\Users\Admin\AppData\Roaming\CJRMake_test\TurboActivate.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD572f2cfa3f0f8de63017cad0748d6641c
SHA1d3e9d0ca256d2580a8a161e82f2e3e92c8abc29c
SHA25622afa0a3accbe3c2827be841d0b3170e0f1a916b0e417eb3ceb15fd10afc2fd6
SHA51291c357ba17c59f726a20360100ea8ea10fa06544666192ce70581b857b82a319026fb2a37a8094bf517cdbc9186cf1c5c0ad7d10337ea8133d6f158eed2d11ed
-
Filesize
1.1MB
MD56eb71453c1fa92a1da76de9900dabd2e
SHA1621d709365de5162353314ff29ef94eebd44b022
SHA256e20c675dffa04b43dd782d97066394a58b48f4c56f0656196240b1fa866d2876
SHA5123bc5b8c125eba4e9f15c48127e945ec39e62dc7c95b53f9349e1d78669a83409a844d5f14d0b0d41512af20f474aa75b54615d862eb0faa0f11a0c429b85c2cc
-
Filesize
907KB
MD59d6d7d788162b2545aedd074d3ed4934
SHA118d0ebfae375635ae30e819ecf2bae2a258bfbc3
SHA256a75af108cbdaad909b209bef6689ba3c5bbe1fb4cad84b957fdf759ad54b9601
SHA5124b8dfe1ab018d500f5424284650356682eb2bca12126379b60616be7c9c65fc0ecef03c4b138d2976a72ba466476276e96be190dd893c826be42bbc8f8e02dc6
-
Filesize
69KB
MD570517f819f81588a8e3ca18cddab71ab
SHA1b3597b602ed1923c6c8f32cf45ca4aea29c970fb
SHA256d83ca7bf0b198887864fe314561128bb1955105ebb75929a26cfecdac00758b0
SHA51267cec4435a0aba475725df6b3145ba128bf444722aa4c142624dd15e110f9dd0d297d07db7b26b08ca815d92bef23c84eca5dda5838f217299ef87a5f86d59a6
-
Filesize
2.4MB
MD5cda7e99fccff66f8c74e095b8a68ce3c
SHA18f18edaaae0193ccee9b8fe0ad8187238ca199b9
SHA25611c9aa66f47deedddb7c37bcd2e4eeab947336cd6084a4996511dca48f92a368
SHA512f08bbe26b9266767424060881f92049a10d37f94edac809edde2af32f52d3581a1c07055d4e18cd8eef7699b7c4ad95f1c21b50ac43d0378d1be3d462ee12887
-
Filesize
626KB
MD577435ab4fc2663f5c0b010234bd48daa
SHA1d772bf675e3db41ec83d49e5a92d2fa176da921e
SHA256cdfa16d810a6616418b8332a46302ac220ff18fd3f0d5aa559447ef1ee752791
SHA512d589621cddc629700025c7a5190feb2394c0db33b77aef122b8e666cac8fc5b02cf971adb43d712158fa1805b9a58f81aa0da99578dbe4c42dc73d0a2a9480b1
-
Filesize
286KB
MD5d9c75a5749132d77ae709c5eae6fe9dd
SHA10142e7c95d4e5a691160d3330fdb626e196715a3
SHA2565a4a4aeba559b86db6d95eacc289ad27f84749e35cb51587d26355bf7732548a
SHA51256b4971ecd595f2198557204eeeaf05e465c31728e2df776202199e28668c42344a7e0f52b191604b45ea0ebaa4fe050b97c7243a5f809a42c5e322f74326975