Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2025, 08:05

General

  • Target

    Edgeviewwebs.exe

  • Size

    2.5MB

  • MD5

    00c1daf7a4eb037fe33278fe676663ea

  • SHA1

    d39aeaf8b76b6176109958653db7dbd64fa69882

  • SHA256

    63c6397f3431639ee54b68cf2837024862d699ccdc41cddf64058be91ae0b87e

  • SHA512

    5824bff18621563fb94bfef2742b922e5bb32d09a5b6b44415e67104dd59552b94e977b2ce3ea608728c721bd96fa256bf89f6b5892290a1346c8eee532391c1

  • SSDEEP

    49152:cTuaAhwBhBtt49Y5t/RaSuCALkusLGZOC6c/EHXEAFJzQyMN/:cKaAh0y252SuC6kusCZjY3EAzzG/

Malware Config

Extracted

Family

remcos

Version

6.1.0 Light

Botnet

Edgeweb

C2

72.5.42.161:6666

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Edg-G6MPI6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe
    "C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\TEMP\{58DAFBD1-DDA9-4592-9F24-8D2C4B2B178E}\.cr\Edgeviewwebs.exe
      "C:\Windows\TEMP\{58DAFBD1-DDA9-4592-9F24-8D2C4B2B178E}\.cr\Edgeviewwebs.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Edgeviewwebs.exe" -burn.filehandle.attached=216 -burn.filehandle.self=212
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.exe
        C:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Roaming\CJRMake_test\TurboActivate.exe
          C:\Users\Admin\AppData\Roaming\CJRMake_test\TurboActivate.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\SysWOW64\cmd.exe
              6⤵
              • Blocklisted process makes network request
              • System Location Discovery: System Language Discovery
              PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\289622c5

    Filesize

    1.1MB

    MD5

    72f2cfa3f0f8de63017cad0748d6641c

    SHA1

    d3e9d0ca256d2580a8a161e82f2e3e92c8abc29c

    SHA256

    22afa0a3accbe3c2827be841d0b3170e0f1a916b0e417eb3ceb15fd10afc2fd6

    SHA512

    91c357ba17c59f726a20360100ea8ea10fa06544666192ce70581b857b82a319026fb2a37a8094bf517cdbc9186cf1c5c0ad7d10337ea8133d6f158eed2d11ed

  • C:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.dll

    Filesize

    1.1MB

    MD5

    6eb71453c1fa92a1da76de9900dabd2e

    SHA1

    621d709365de5162353314ff29ef94eebd44b022

    SHA256

    e20c675dffa04b43dd782d97066394a58b48f4c56f0656196240b1fa866d2876

    SHA512

    3bc5b8c125eba4e9f15c48127e945ec39e62dc7c95b53f9349e1d78669a83409a844d5f14d0b0d41512af20f474aa75b54615d862eb0faa0f11a0c429b85c2cc

  • C:\Windows\TEMP\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\chlamydia.ai

    Filesize

    907KB

    MD5

    9d6d7d788162b2545aedd074d3ed4934

    SHA1

    18d0ebfae375635ae30e819ecf2bae2a258bfbc3

    SHA256

    a75af108cbdaad909b209bef6689ba3c5bbe1fb4cad84b957fdf759ad54b9601

    SHA512

    4b8dfe1ab018d500f5424284650356682eb2bca12126379b60616be7c9c65fc0ecef03c4b138d2976a72ba466476276e96be190dd893c826be42bbc8f8e02dc6

  • C:\Windows\Temp\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\dyskinesia.iso

    Filesize

    69KB

    MD5

    70517f819f81588a8e3ca18cddab71ab

    SHA1

    b3597b602ed1923c6c8f32cf45ca4aea29c970fb

    SHA256

    d83ca7bf0b198887864fe314561128bb1955105ebb75929a26cfecdac00758b0

    SHA512

    67cec4435a0aba475725df6b3145ba128bf444722aa4c142624dd15e110f9dd0d297d07db7b26b08ca815d92bef23c84eca5dda5838f217299ef87a5f86d59a6

  • \Windows\Temp\{58DAFBD1-DDA9-4592-9F24-8D2C4B2B178E}\.cr\Edgeviewwebs.exe

    Filesize

    2.4MB

    MD5

    cda7e99fccff66f8c74e095b8a68ce3c

    SHA1

    8f18edaaae0193ccee9b8fe0ad8187238ca199b9

    SHA256

    11c9aa66f47deedddb7c37bcd2e4eeab947336cd6084a4996511dca48f92a368

    SHA512

    f08bbe26b9266767424060881f92049a10d37f94edac809edde2af32f52d3581a1c07055d4e18cd8eef7699b7c4ad95f1c21b50ac43d0378d1be3d462ee12887

  • \Windows\Temp\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\Decennary.dll

    Filesize

    626KB

    MD5

    77435ab4fc2663f5c0b010234bd48daa

    SHA1

    d772bf675e3db41ec83d49e5a92d2fa176da921e

    SHA256

    cdfa16d810a6616418b8332a46302ac220ff18fd3f0d5aa559447ef1ee752791

    SHA512

    d589621cddc629700025c7a5190feb2394c0db33b77aef122b8e666cac8fc5b02cf971adb43d712158fa1805b9a58f81aa0da99578dbe4c42dc73d0a2a9480b1

  • \Windows\Temp\{EE8883E1-B3FA-4655-80E4-550CBE56E744}\.ba\TurboActivate.exe

    Filesize

    286KB

    MD5

    d9c75a5749132d77ae709c5eae6fe9dd

    SHA1

    0142e7c95d4e5a691160d3330fdb626e196715a3

    SHA256

    5a4a4aeba559b86db6d95eacc289ad27f84749e35cb51587d26355bf7732548a

    SHA512

    56b4971ecd595f2198557204eeeaf05e465c31728e2df776202199e28668c42344a7e0f52b191604b45ea0ebaa4fe050b97c7243a5f809a42c5e322f74326975

  • memory/2616-90-0x0000000074270000-0x00000000743E4000-memory.dmp

    Filesize

    1.5MB

  • memory/2616-43-0x00000000772F0000-0x0000000077499000-memory.dmp

    Filesize

    1.7MB

  • memory/2816-100-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-97-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-107-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-106-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-105-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-93-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2816-92-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2816-94-0x00000000772F0000-0x0000000077499000-memory.dmp

    Filesize

    1.7MB

  • memory/2816-96-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-104-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-98-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-99-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-103-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-101-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2816-102-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2900-23-0x0000000074320000-0x0000000074494000-memory.dmp

    Filesize

    1.5MB

  • memory/2900-24-0x00000000772F0000-0x0000000077499000-memory.dmp

    Filesize

    1.7MB

  • memory/2996-40-0x0000000074270000-0x00000000743E4000-memory.dmp

    Filesize

    1.5MB

  • memory/2996-38-0x0000000074270000-0x00000000743E4000-memory.dmp

    Filesize

    1.5MB

  • memory/2996-39-0x00000000772F0000-0x0000000077499000-memory.dmp

    Filesize

    1.7MB