Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/03/2025, 01:33

General

  • Target

    remcos_a.exe

  • Size

    431KB

  • MD5

    ce511745116cb492d55c1ffaf9d1d655

  • SHA1

    79de3a27eed9bcfd1012a1b306874e59ff636888

  • SHA256

    cafcac531e6347582823cb2e405f0c3e92162dfcd8f8ea761bcfbf0b0dc10286

  • SHA512

    358b44ef9b6419764f525048ffdd717a55ff22c2d4f18e1ed841c89b4978d371b9343a3d22ac3cd863cc53f9f2eefac4dd08df123ca5f6a2287f4d02c2ac7523

  • SSDEEP

    6144:9IdUXq44bq4LrqMUz2y6cdjJ4nCb0KhEekcdK5xAO2XjXapGc3eou:9IdU6tdyDJZQKhEe7WAXWp8ou

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • UAC bypass 3 TTPs 2 IoCs
  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcos_a.exe
    "C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"
    1⤵
    • UAC bypass
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5532
    • C:\Windows\SysWOW64\dxdiag.exe
      "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt

    Filesize

    84KB

    MD5

    6ab78be0b058d8a019d983a25c92428c

    SHA1

    7768ceec9aeaede73429ea2b60ffd44522dc4186

    SHA256

    aac9b37d4760cea216bf018bd5ee4c28c0c784f09f58ebd948ed1c4ae1417827

    SHA512

    b80746ca77b475ae8e595f99b9d2c4c320ddb1f63b984a30b72cae5dc86cae509f43969b65709eb8543a470fd1eb3b725605cde0e8f3d0552a900a4305ab97cd

  • memory/1576-17-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-14-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-12-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-6-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-7-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-8-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-13-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-16-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-18-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1576-15-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/5532-3-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/5532-5-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/5532-1-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/5532-4-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/5532-62-0x0000000004120000-0x0000000004345000-memory.dmp

    Filesize

    2.1MB