Analysis
-
max time kernel
28s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
25FC004658_Femetagershusenes.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25FC004658_Femetagershusenes.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
25FC004658_Femetagershusenes.exe
-
Size
601KB
-
MD5
77221f5f2a4984872389759b83446a62
-
SHA1
07c1d4795c8ec52dff45be198abde62c331ded59
-
SHA256
d67a5911a1cca695a8e3514e1155c6cc8ace4c1a6b96daf563f6ae3134c6d588
-
SHA512
bd64bd1be5fc366c600c5c88963e368fa82f31c0e692a27e7a7ce8cad0c5c4ac4d41cbba95e98bb5cfe753c3c157c399a2664b4e490068b18b2c7fe27bf10485
-
SSDEEP
12288:SDGg/i9HZmS7DpP5AkavuzLiB5Puhrxk/8872b5GmledTRfSCG+sQCVv:jD5PUkwuKB8rxk0omle3VG+shVv
Malware Config
Extracted
remcos
PAROSH NEW
parosh.didns.ru:3011
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
polshmy
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
psh983mn-LGLX6H
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 Funktionsafprvningerne.exe -
Loads dropped DLL 2 IoCs
pid Process 1836 25FC004658_Femetagershusenes.exe 2792 Funktionsafprvningerne.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Omsadlings = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Ddbiderens\\Funktionsafprvningerne.exe" IMCCPHR.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2764 IMCCPHR.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1836 25FC004658_Femetagershusenes.exe 2764 IMCCPHR.exe 2792 Funktionsafprvningerne.exe 776 IMCCPHR.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\demoralisingly.Mic81 25FC004658_Femetagershusenes.exe File opened for modification C:\Windows\demoralisingly.Mic81 Funktionsafprvningerne.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMCCPHR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25FC004658_Femetagershusenes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMCCPHR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Funktionsafprvningerne.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1836 25FC004658_Femetagershusenes.exe 2792 Funktionsafprvningerne.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 IMCCPHR.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2764 1836 25FC004658_Femetagershusenes.exe 31 PID 1836 wrote to memory of 2764 1836 25FC004658_Femetagershusenes.exe 31 PID 1836 wrote to memory of 2764 1836 25FC004658_Femetagershusenes.exe 31 PID 1836 wrote to memory of 2764 1836 25FC004658_Femetagershusenes.exe 31 PID 1836 wrote to memory of 2764 1836 25FC004658_Femetagershusenes.exe 31 PID 2876 wrote to memory of 2792 2876 explorer.exe 33 PID 2876 wrote to memory of 2792 2876 explorer.exe 33 PID 2876 wrote to memory of 2792 2876 explorer.exe 33 PID 2876 wrote to memory of 2792 2876 explorer.exe 33 PID 2792 wrote to memory of 776 2792 Funktionsafprvningerne.exe 36 PID 2792 wrote to memory of 776 2792 Funktionsafprvningerne.exe 36 PID 2792 wrote to memory of 776 2792 Funktionsafprvningerne.exe 36 PID 2792 wrote to memory of 776 2792 Funktionsafprvningerne.exe 36 PID 2792 wrote to memory of 776 2792 Funktionsafprvningerne.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25FC004658_Femetagershusenes.exe"C:\Users\Admin\AppData\Local\Temp\25FC004658_Femetagershusenes.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\IME\SHARED\IMCCPHR.exe"C:\Users\Admin\AppData\Local\Temp\25FC004658_Femetagershusenes.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Ddbiderens\Funktionsafprvningerne.exe"C:\Users\Admin\AppData\Local\Temp\Ddbiderens\Funktionsafprvningerne.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\IME\SHARED\IMCCPHR.exe"C:\Users\Admin\AppData\Local\Temp\Ddbiderens\Funktionsafprvningerne.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:776
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601KB
MD577221f5f2a4984872389759b83446a62
SHA107c1d4795c8ec52dff45be198abde62c331ded59
SHA256d67a5911a1cca695a8e3514e1155c6cc8ace4c1a6b96daf563f6ae3134c6d588
SHA512bd64bd1be5fc366c600c5c88963e368fa82f31c0e692a27e7a7ce8cad0c5c4ac4d41cbba95e98bb5cfe753c3c157c399a2664b4e490068b18b2c7fe27bf10485
-
Filesize
358B
MD5a7171e05f022a1f6a7248e12fbccf748
SHA1892d0916f107e4353f9b1f8195eae8c7288a9786
SHA2566752d4faabfb64279eb5dc73418ed24d1d9cdb78a92915984b4c395842768b94
SHA512c09becb22987b2a7c67e67e36c01ea6f7c874cef759d526eb61e4a59887a65d2b476a7b8efe6db1e3204d14aa3f245cf6b78a890fc20ac2977183b194a1826d6
-
Filesize
361KB
MD54ec9cbbd7066419d2ceff69ad3805e01
SHA14d197384c43e59aace38749aa8194657c594fe5e
SHA256129a1f70792363b3359623b465db0dcf9fa3267e36322b04eea5739086d9fcfa
SHA51286a842c471d1db41bf47040d3a14945c2e1dcda265ac6966defe744628b3f2b6fb92ad5b7a72c38466f9165f5e3163e81e2392f37b7f761862619f55bf436ee1
-
Filesize
51KB
MD513b04bc417af81c854aa09dbb72af9c0
SHA198c21022ed8b3a853e941e3198736a00916cda3f
SHA256fc21d861ddd497bd57bddb3bc2f565212d6851f7b4a59154f0dbb06926f393e6
SHA512a41c15512047491a90f9adbc46a840a69379f1cddebd8ec7100d2fc2e1fae414ae59dcb226da91c00362f9de1a0f7401e66a1e0f1f5daab7407ee10c76eedc9f
-
Filesize
124KB
MD507d9ec3690d68db14a35137e43e76590
SHA1af3bcb09e8f9a095fc3aa747d73fd0701815d24e
SHA256491cb797cfde3e8d2bdb9028f29a85f5bb9be1b8758c0b4f30b01655cdbcd14a
SHA51266225f7b3c8898d93fdcf22b49f1f771dc01673ca240344675dbbc9c8d589e8bf9d57c9dcd6f98dec61df88427230a4213523661cc843bc23d41092057c22db0
-
Filesize
20KB
MD58a77aa30afbd169c284151b0acf9e1fe
SHA18f5a0efd679b65db330eaab529db1bf95a77ae8c
SHA25663d4e6bc6f0cd4d9703b8e053fc6f178775bb195fede282767a020f83d6f93f4
SHA512665f237bc99601a4456f59b8cfa5c135856d0487ac23cfddc67e2787cb83b06fdb3b334164a50da07bfc6be12bbb0597793021051f3a18a2aecf6cb5c4f1ea3b
-
Filesize
147KB
MD5a5ad600eaeb7b4bd6f7e7bd7e4d382cb
SHA1e6d7f9dec77f3d6b01e789679d8cbe1d9021e272
SHA25621db5b3b885475eca98160ea34fbdc0303a54ad36fa41ca71f6dbe5c3570897d
SHA512a5bc1cb401b08dd1546365a6072aaa4602e1995e39f972cde8c0bc8ee7569480c0f75aeb03106564d8985488850d383702700b2f730c1cbccca18d4234b867c1
-
Filesize
190KB
MD53f4118f3e2bf1f342eed397c3b00512a
SHA103e94f6f726aa9709b677017e212e4a795fb93fa
SHA256dcf483fcbf601d8e5c57339369d7f79bbafba07e80b39fbe0b9b8e12f067a250
SHA512621acce677f3ff07f94598fdb48c47f2e77c2d9ab3e8452501664d3c33d599cd9fd5ebb630cdf19bc4793272db36fc122ccc93170d192fab16e3aefba79b54d3
-
Filesize
30B
MD59c41990255c107edff8d7ed715760746
SHA10adb5cd40454e53a34d2df3be971bea9b0e04452
SHA256997506e1e3a395a57a4db940529da99b73d113bb10469d4e279bfbb8f67640b8
SHA512d3cf4252752dd96e7fd855404f82ea57ad589f4d69b9df2bb93647657805f347ec65b97afa3fb0ec35e068b8deae31f863ed6c2e18bbe4146b03464301002018
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3