Analysis

  • max time kernel
    300s
  • max time network
    275s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 15:54

General

  • Target

    HOLIDAY ADVISORY_pdf.exe

  • Size

    692KB

  • MD5

    eab28b38de8b8a0f6aa4e2950208651f

  • SHA1

    ba3002c433bf92c8ab98b452f30bfa9cd1159cb6

  • SHA256

    eb39f5737c6947b6e0ef5e60be7e0ccc652d5872b4d60597f394fa24fa308bbb

  • SHA512

    b0b2f53737671b8d61140b5bb3202228345a3105725d17917e7b9f0bc3fc0c20c7315129bd9fb0bd02f6bd66f16608bc76732f40091158ccc64517dfa126053b

  • SSDEEP

    12288:2tqNqNVIdl0eqmgMWH7MeB9tx7APK8inDh+/l+X9WI+cojGxB6sd:6rrmuftx7APK8in9wEQBjGxIsd

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:2404

196.251.93.4:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LQXWP4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\ProgramData\Remcos\remcos.exe
        "C:\ProgramData\Remcos\remcos.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:100
        • C:\ProgramData\Remcos\remcos.exe
          "C:\ProgramData\Remcos\remcos.exe"
          4⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\SysWOW64\recover.exe
            C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\zxuoxyxuoqi"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1276
          • C:\Windows\SysWOW64\recover.exe
            C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\jzizqqincyarhd"
            5⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:2744
          • C:\Windows\SysWOW64\recover.exe
            C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\lunrrjtpqgswrjzjd"
            5⤵
              PID:1096
            • C:\Windows\SysWOW64\recover.exe
              C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\lunrrjtpqgswrjzjd"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Remcos\remcos.exe

      Filesize

      692KB

      MD5

      eab28b38de8b8a0f6aa4e2950208651f

      SHA1

      ba3002c433bf92c8ab98b452f30bfa9cd1159cb6

      SHA256

      eb39f5737c6947b6e0ef5e60be7e0ccc652d5872b4d60597f394fa24fa308bbb

      SHA512

      b0b2f53737671b8d61140b5bb3202228345a3105725d17917e7b9f0bc3fc0c20c7315129bd9fb0bd02f6bd66f16608bc76732f40091158ccc64517dfa126053b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      6434cf0829b175204fe49e1b957df3e9

      SHA1

      5e7b913ed873875e6c408908321d9fc5e27bdb66

      SHA256

      953ec42e5475baf6e166c5b4c63132ab8bd705e8e213946c4437d5bc661b6f53

      SHA512

      26cee6164845d6551f26da93126b84730fa57e8f754cc5eed17a9d174e3f708c91be9638642ea2437e73eb7f72499d644f360171ccfc198cb057bca4038937c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C

      Filesize

      472B

      MD5

      f4959910ec4eaf0413ff061ac1c4c89f

      SHA1

      d0d101d7d059edeb60ab2d36510f25ada58f30d0

      SHA256

      528e980172b6f954e943e20c8d655213c70049bee0fbdeb2c257f1b5ff954cbc

      SHA512

      c2eef90524a5faa1bf3786f37a21147d7a65b66a340f75e63a4aa1d684718bd60c6f78a5fbb8b786f852e9f112047a2a913be84c7e14d13fe3664059caaa95ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069

      Filesize

      471B

      MD5

      e0cc843d8a16c3f290bbf2f9f6382d14

      SHA1

      800c08bc4707406fa200413cab8865d000ee1ce8

      SHA256

      c98b3c581a604e2a77c92a7e6cf7e886f09f2cdd1012a603b57bc0decc150a8d

      SHA512

      d197e24de3d97877e0aebac6c4fc975307a6206c4aab3662edd095e0a0f97f21bfc6c49934591e40e584120651b6b859d69f96431f39af50e15c5302264f4c57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      5022e27918888b24ba023104c6e0bcf1

      SHA1

      d59edb0dd55164948613a221a9522137798ce226

      SHA256

      3dd2dfe0f866a65970a11fbfa5479cdcf6e266db9f5c181e8c7ec6a62ea08ac0

      SHA512

      5a4952d25567f771d07b106fcacfb1f878d014feec7fac45251b55860a986d4515546c595496c2201a9283fe862651dcd4985e820278b82641998652ae79309d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C

      Filesize

      402B

      MD5

      2ad57e0d21cb78853b9e5c3102bbd41c

      SHA1

      d09fecbaecd4030e156cca0f27490c27edfa9b62

      SHA256

      65594729268c1abc59cf81e1e8ea2ef8542a04b3410fb8457756c38223c5c37d

      SHA512

      6d72301aa14191da997a3c81b4d37f50c61e3add7572ea440f66d2359177dae7714b8b2bcb5c56ed89ec136511265274b64079abe137d813e71ff7b0a6b33e5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069

      Filesize

      402B

      MD5

      acfb1e4801118487f4ea1e875aaab3b2

      SHA1

      a51cbfc689ce3f993ef2b5e321f1ec13e3ae87b6

      SHA256

      e2fcf697a924f2df95962909fb809f01f6eb0bfc7876688503df7bc9243e965f

      SHA512

      2be1fa54c665a3c31189c38cc5a728c23b724525bbff25caae7291051a2646b666fdb440d5a1a2b2b297e5f1339c85f7f4eecba138695cbfeae1a1540a39766b

    • C:\Users\Admin\AppData\Local\Temp\apiculation\Basinets.Pon

      Filesize

      37KB

      MD5

      f2126a7fd58d5568afec85a52510fc4a

      SHA1

      202b6123734967fb4e0dd48054f987f91553e7fb

      SHA256

      0a42875f50c697a8bcb05685612eba53b727ae1b5d29f203c8762740aca147be

      SHA512

      fa9a304733743f2e05e0b89b58c2fb45443e0dd736f1284a388691efc0b60448c75f42e693271f764dd90160ded3c9807a58b44d2f39363675319b1b9777620f

    • C:\Users\Admin\AppData\Local\Temp\apiculation\Vimpel21\misfornoejet.ini

      Filesize

      520B

      MD5

      47f8725a8bc102d5ab3fa35667b2b949

      SHA1

      092cc12fe1e6d9e51651e8719f2b4bc739d171d9

      SHA256

      9d7e00fa077347545222e5a2149f0c3b8301fb87efef760d6b39b01a92ee6ca8

      SHA512

      3fca9025acfe9d8e8bde0dceb81ef91ae87c9e1261595820720c8b2178c38cb425d321fe82e101e2815bd9e61c07024f743ba01952ddddba4037540a9928ac93

    • C:\Users\Admin\AppData\Local\Temp\apiculation\Vimpel21\pinde.ist

      Filesize

      427KB

      MD5

      7c97b2d42ed9704724584357a70e2979

      SHA1

      02c38991f1aa4ad07480d02996e878db8eb13bf6

      SHA256

      aab2f2f21262955bebae1f5c7d1be6a293cf53ca389715e1151f0921d7d725ae

      SHA512

      c7cc13a0e4d5c5cdc937ebca8b6586366dbf6bf3705d7eb2a9c94378d69e8a022783d21a934bc96257aacb37e4a64df463e9d67260d15d4e9e8d3916772e9c0a

    • C:\Users\Admin\AppData\Local\Temp\apiculation\brneflokken.jpg

      Filesize

      14KB

      MD5

      69cfd651e09143cbf052437ae8326ba2

      SHA1

      8b8da043a80df5a2e4fc927eb154e8cce84ab0af

      SHA256

      fa191d2f62ec6c1c1e8a06a7fd69ee0f5c3363f987d530655b3ca9f110c483ba

      SHA512

      b8d2777e38709455e1d279d4f35d58696ff76372c61d9c18a097662ece9cc3a0a73e84bb6d06f4302755839d599b0d12d819aaaa48da86e2f657ead78b5470f8

    • C:\Users\Admin\AppData\Local\Temp\apiculation\civilisationerne.tor

      Filesize

      438KB

      MD5

      ea9df23d2bc5c8baa627abfbe6568437

      SHA1

      703c406327bd5bcbd407a6dc4a4909de3aba8860

      SHA256

      e9413bf593186188b6aab5d8433241cb9037c3d389c518e63f3abe9a985a8c43

      SHA512

      dff4beaf695fadf7db7f41e4335c6c93cc632e3ae6b44d15ad96e58c938e4f79eafbc44c4a93782a9cbf0e15dd9ef3a99a4a36225ae26cee61a696e1c64de398

    • C:\Users\Admin\AppData\Local\Temp\apiculation\kloakanlgget.opv

      Filesize

      403KB

      MD5

      cb86126f4f8c0cbe16927cbe1000eb69

      SHA1

      6f40b620899e89bb9e1a7d98ea02d0bf3c3d33dd

      SHA256

      993ea1af111673eab9586a4e816693e504d746ef3faff7ca1feaf5954c6fe46d

      SHA512

      cac07c95452f39719fdf9dcbb47bf078822ddf1b9cca2352c2ebc159974f4d2f2954785e49b12d92a87262b70b06c8da57bd95becdfb0d29b2905655d95e3f86

    • C:\Users\Admin\AppData\Local\Temp\nsf925F.tmp\System.dll

      Filesize

      11KB

      MD5

      6f5257c0b8c0ef4d440f4f4fce85fb1b

      SHA1

      b6ac111dfb0d1fc75ad09c56bde7830232395785

      SHA256

      b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

      SHA512

      a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

    • C:\Users\Admin\AppData\Local\Temp\zxuoxyxuoqi

      Filesize

      4KB

      MD5

      8c7026b1782eb70d9339c3525a05528b

      SHA1

      9087399b2f863d19157a45702c66932a0d028211

      SHA256

      c9ccfd99d8866661dcc1e1cfcd01619d12ac835db6f2859e1aa4d873b6996622

      SHA512

      52b94ef24556888cab372bb5f8510ef849a39228f627a61a75a3e11ce8c55b205d348d340881da9cd0bab41218831a285b6ba50cfc7e4851d57efe85d7ebdf8c

    • memory/396-15-0x0000000010004000-0x0000000010005000-memory.dmp

      Filesize

      4KB

    • memory/396-14-0x00000000778C1000-0x00000000779E1000-memory.dmp

      Filesize

      1.1MB

    • memory/1276-87-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/1276-85-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/1928-83-0x00000000016C0000-0x000000000630D000-memory.dmp

      Filesize

      76.3MB

    • memory/1928-111-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-127-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-126-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-125-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-124-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-123-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-122-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-78-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-79-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-70-0x00000000016C0000-0x000000000630D000-memory.dmp

      Filesize

      76.3MB

    • memory/1928-106-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-118-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-105-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-104-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-117-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-116-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-113-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-112-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-110-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/1928-98-0x0000000037110000-0x0000000037129000-memory.dmp

      Filesize

      100KB

    • memory/1928-102-0x0000000037110000-0x0000000037129000-memory.dmp

      Filesize

      100KB

    • memory/1928-101-0x0000000037110000-0x0000000037129000-memory.dmp

      Filesize

      100KB

    • memory/1928-103-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/2744-88-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/2744-89-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/2744-86-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/3860-19-0x0000000077965000-0x0000000077966000-memory.dmp

      Filesize

      4KB

    • memory/3860-16-0x00000000016C0000-0x000000000630D000-memory.dmp

      Filesize

      76.3MB

    • memory/3860-17-0x00000000778C1000-0x00000000779E1000-memory.dmp

      Filesize

      1.1MB

    • memory/3860-18-0x0000000077948000-0x0000000077949000-memory.dmp

      Filesize

      4KB

    • memory/3860-29-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/3860-30-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/3860-34-0x00000000778C1000-0x00000000779E1000-memory.dmp

      Filesize

      1.1MB

    • memory/3860-47-0x00000000778C1000-0x00000000779E1000-memory.dmp

      Filesize

      1.1MB

    • memory/3860-36-0x00000000016C0000-0x000000000630D000-memory.dmp

      Filesize

      76.3MB

    • memory/3860-46-0x0000000000460000-0x00000000016B4000-memory.dmp

      Filesize

      18.3MB

    • memory/4180-95-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4180-94-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4180-91-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB