Analysis
-
max time kernel
300s -
max time network
275s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
HOLIDAY ADVISORY_pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HOLIDAY ADVISORY_pdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
HOLIDAY ADVISORY_pdf.exe
-
Size
692KB
-
MD5
eab28b38de8b8a0f6aa4e2950208651f
-
SHA1
ba3002c433bf92c8ab98b452f30bfa9cd1159cb6
-
SHA256
eb39f5737c6947b6e0ef5e60be7e0ccc652d5872b4d60597f394fa24fa308bbb
-
SHA512
b0b2f53737671b8d61140b5bb3202228345a3105725d17917e7b9f0bc3fc0c20c7315129bd9fb0bd02f6bd66f16608bc76732f40091158ccc64517dfa126053b
-
SSDEEP
12288:2tqNqNVIdl0eqmgMWH7MeB9tx7APK8inDh+/l+X9WI+cojGxB6sd:6rrmuftx7APK8in9wEQBjGxIsd
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:2404
196.251.93.4:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-LQXWP4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2744-89-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1276-87-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral2/memory/1276-85-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral2/memory/4180-95-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2744-89-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1276-87-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral2/memory/1276-85-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation HOLIDAY ADVISORY_pdf.exe -
Executes dropped EXE 1 IoCs
pid Process 100 remcos.exe -
Loads dropped DLL 5 IoCs
pid Process 396 HOLIDAY ADVISORY_pdf.exe 396 HOLIDAY ADVISORY_pdf.exe 100 remcos.exe 100 remcos.exe 1928 remcos.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-LQXWP4 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-LQXWP4 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-LQXWP4 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HOLIDAY ADVISORY_pdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-LQXWP4 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" HOLIDAY ADVISORY_pdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 34 drive.google.com 70 drive.google.com 33 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 3860 HOLIDAY ADVISORY_pdf.exe 1928 remcos.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 396 HOLIDAY ADVISORY_pdf.exe 3860 HOLIDAY ADVISORY_pdf.exe 100 remcos.exe 1928 remcos.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1928 set thread context of 1276 1928 remcos.exe 112 PID 1928 set thread context of 2744 1928 remcos.exe 113 PID 1928 set thread context of 4180 1928 remcos.exe 115 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\pastoralized.eva HOLIDAY ADVISORY_pdf.exe File opened for modification C:\Program Files (x86)\pastoralized.eva remcos.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\vddende.Dra remcos.exe File opened for modification C:\Windows\resources\kickstands.uns remcos.exe File opened for modification C:\Windows\resources\0409\vddende.Dra HOLIDAY ADVISORY_pdf.exe File opened for modification C:\Windows\resources\kickstands.uns HOLIDAY ADVISORY_pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOLIDAY ADVISORY_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOLIDAY ADVISORY_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000800000001e6c8-40.dat nsis_installer_1 behavioral2/files/0x000800000001e6c8-40.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1276 recover.exe 1276 recover.exe 4180 recover.exe 4180 recover.exe 1276 recover.exe 1276 recover.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 396 HOLIDAY ADVISORY_pdf.exe 100 remcos.exe 1928 remcos.exe 1928 remcos.exe 1928 remcos.exe 1928 remcos.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4180 recover.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 396 wrote to memory of 3860 396 HOLIDAY ADVISORY_pdf.exe 99 PID 396 wrote to memory of 3860 396 HOLIDAY ADVISORY_pdf.exe 99 PID 396 wrote to memory of 3860 396 HOLIDAY ADVISORY_pdf.exe 99 PID 396 wrote to memory of 3860 396 HOLIDAY ADVISORY_pdf.exe 99 PID 3860 wrote to memory of 100 3860 HOLIDAY ADVISORY_pdf.exe 102 PID 3860 wrote to memory of 100 3860 HOLIDAY ADVISORY_pdf.exe 102 PID 3860 wrote to memory of 100 3860 HOLIDAY ADVISORY_pdf.exe 102 PID 100 wrote to memory of 1928 100 remcos.exe 111 PID 100 wrote to memory of 1928 100 remcos.exe 111 PID 100 wrote to memory of 1928 100 remcos.exe 111 PID 100 wrote to memory of 1928 100 remcos.exe 111 PID 1928 wrote to memory of 1276 1928 remcos.exe 112 PID 1928 wrote to memory of 1276 1928 remcos.exe 112 PID 1928 wrote to memory of 1276 1928 remcos.exe 112 PID 1928 wrote to memory of 1276 1928 remcos.exe 112 PID 1928 wrote to memory of 2744 1928 remcos.exe 113 PID 1928 wrote to memory of 2744 1928 remcos.exe 113 PID 1928 wrote to memory of 2744 1928 remcos.exe 113 PID 1928 wrote to memory of 2744 1928 remcos.exe 113 PID 1928 wrote to memory of 1096 1928 remcos.exe 114 PID 1928 wrote to memory of 1096 1928 remcos.exe 114 PID 1928 wrote to memory of 1096 1928 remcos.exe 114 PID 1928 wrote to memory of 4180 1928 remcos.exe 115 PID 1928 wrote to memory of 4180 1928 remcos.exe 115 PID 1928 wrote to memory of 4180 1928 remcos.exe 115 PID 1928 wrote to memory of 4180 1928 remcos.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"C:\Users\Admin\AppData\Local\Temp\HOLIDAY ADVISORY_pdf.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:100 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\zxuoxyxuoqi"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\jzizqqincyarhd"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\lunrrjtpqgswrjzjd"5⤵PID:1096
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\lunrrjtpqgswrjzjd"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD5eab28b38de8b8a0f6aa4e2950208651f
SHA1ba3002c433bf92c8ab98b452f30bfa9cd1159cb6
SHA256eb39f5737c6947b6e0ef5e60be7e0ccc652d5872b4d60597f394fa24fa308bbb
SHA512b0b2f53737671b8d61140b5bb3202228345a3105725d17917e7b9f0bc3fc0c20c7315129bd9fb0bd02f6bd66f16608bc76732f40091158ccc64517dfa126053b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56434cf0829b175204fe49e1b957df3e9
SHA15e7b913ed873875e6c408908321d9fc5e27bdb66
SHA256953ec42e5475baf6e166c5b4c63132ab8bd705e8e213946c4437d5bc661b6f53
SHA51226cee6164845d6551f26da93126b84730fa57e8f754cc5eed17a9d174e3f708c91be9638642ea2437e73eb7f72499d644f360171ccfc198cb057bca4038937c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C
Filesize472B
MD5f4959910ec4eaf0413ff061ac1c4c89f
SHA1d0d101d7d059edeb60ab2d36510f25ada58f30d0
SHA256528e980172b6f954e943e20c8d655213c70049bee0fbdeb2c257f1b5ff954cbc
SHA512c2eef90524a5faa1bf3786f37a21147d7a65b66a340f75e63a4aa1d684718bd60c6f78a5fbb8b786f852e9f112047a2a913be84c7e14d13fe3664059caaa95ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069
Filesize471B
MD5e0cc843d8a16c3f290bbf2f9f6382d14
SHA1800c08bc4707406fa200413cab8865d000ee1ce8
SHA256c98b3c581a604e2a77c92a7e6cf7e886f09f2cdd1012a603b57bc0decc150a8d
SHA512d197e24de3d97877e0aebac6c4fc975307a6206c4aab3662edd095e0a0f97f21bfc6c49934591e40e584120651b6b859d69f96431f39af50e15c5302264f4c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55022e27918888b24ba023104c6e0bcf1
SHA1d59edb0dd55164948613a221a9522137798ce226
SHA2563dd2dfe0f866a65970a11fbfa5479cdcf6e266db9f5c181e8c7ec6a62ea08ac0
SHA5125a4952d25567f771d07b106fcacfb1f878d014feec7fac45251b55860a986d4515546c595496c2201a9283fe862651dcd4985e820278b82641998652ae79309d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C
Filesize402B
MD52ad57e0d21cb78853b9e5c3102bbd41c
SHA1d09fecbaecd4030e156cca0f27490c27edfa9b62
SHA25665594729268c1abc59cf81e1e8ea2ef8542a04b3410fb8457756c38223c5c37d
SHA5126d72301aa14191da997a3c81b4d37f50c61e3add7572ea440f66d2359177dae7714b8b2bcb5c56ed89ec136511265274b64079abe137d813e71ff7b0a6b33e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069
Filesize402B
MD5acfb1e4801118487f4ea1e875aaab3b2
SHA1a51cbfc689ce3f993ef2b5e321f1ec13e3ae87b6
SHA256e2fcf697a924f2df95962909fb809f01f6eb0bfc7876688503df7bc9243e965f
SHA5122be1fa54c665a3c31189c38cc5a728c23b724525bbff25caae7291051a2646b666fdb440d5a1a2b2b297e5f1339c85f7f4eecba138695cbfeae1a1540a39766b
-
Filesize
37KB
MD5f2126a7fd58d5568afec85a52510fc4a
SHA1202b6123734967fb4e0dd48054f987f91553e7fb
SHA2560a42875f50c697a8bcb05685612eba53b727ae1b5d29f203c8762740aca147be
SHA512fa9a304733743f2e05e0b89b58c2fb45443e0dd736f1284a388691efc0b60448c75f42e693271f764dd90160ded3c9807a58b44d2f39363675319b1b9777620f
-
Filesize
520B
MD547f8725a8bc102d5ab3fa35667b2b949
SHA1092cc12fe1e6d9e51651e8719f2b4bc739d171d9
SHA2569d7e00fa077347545222e5a2149f0c3b8301fb87efef760d6b39b01a92ee6ca8
SHA5123fca9025acfe9d8e8bde0dceb81ef91ae87c9e1261595820720c8b2178c38cb425d321fe82e101e2815bd9e61c07024f743ba01952ddddba4037540a9928ac93
-
Filesize
427KB
MD57c97b2d42ed9704724584357a70e2979
SHA102c38991f1aa4ad07480d02996e878db8eb13bf6
SHA256aab2f2f21262955bebae1f5c7d1be6a293cf53ca389715e1151f0921d7d725ae
SHA512c7cc13a0e4d5c5cdc937ebca8b6586366dbf6bf3705d7eb2a9c94378d69e8a022783d21a934bc96257aacb37e4a64df463e9d67260d15d4e9e8d3916772e9c0a
-
Filesize
14KB
MD569cfd651e09143cbf052437ae8326ba2
SHA18b8da043a80df5a2e4fc927eb154e8cce84ab0af
SHA256fa191d2f62ec6c1c1e8a06a7fd69ee0f5c3363f987d530655b3ca9f110c483ba
SHA512b8d2777e38709455e1d279d4f35d58696ff76372c61d9c18a097662ece9cc3a0a73e84bb6d06f4302755839d599b0d12d819aaaa48da86e2f657ead78b5470f8
-
Filesize
438KB
MD5ea9df23d2bc5c8baa627abfbe6568437
SHA1703c406327bd5bcbd407a6dc4a4909de3aba8860
SHA256e9413bf593186188b6aab5d8433241cb9037c3d389c518e63f3abe9a985a8c43
SHA512dff4beaf695fadf7db7f41e4335c6c93cc632e3ae6b44d15ad96e58c938e4f79eafbc44c4a93782a9cbf0e15dd9ef3a99a4a36225ae26cee61a696e1c64de398
-
Filesize
403KB
MD5cb86126f4f8c0cbe16927cbe1000eb69
SHA16f40b620899e89bb9e1a7d98ea02d0bf3c3d33dd
SHA256993ea1af111673eab9586a4e816693e504d746ef3faff7ca1feaf5954c6fe46d
SHA512cac07c95452f39719fdf9dcbb47bf078822ddf1b9cca2352c2ebc159974f4d2f2954785e49b12d92a87262b70b06c8da57bd95becdfb0d29b2905655d95e3f86
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
4KB
MD58c7026b1782eb70d9339c3525a05528b
SHA19087399b2f863d19157a45702c66932a0d028211
SHA256c9ccfd99d8866661dcc1e1cfcd01619d12ac835db6f2859e1aa4d873b6996622
SHA51252b94ef24556888cab372bb5f8510ef849a39228f627a61a75a3e11ce8c55b205d348d340881da9cd0bab41218831a285b6ba50cfc7e4851d57efe85d7ebdf8c