Overview
overview
10Static
static
10Files/0018...8a.exe
windows7-x64
10Files/0018...8a.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Files/059c...6b.exe
windows7-x64
3Files/059c...6b.exe
windows10-2004-x64
3Files/0761...50.exe
windows7-x64
5Files/0761...50.exe
windows10-2004-x64
5Files/0b4a...e6.exe
windows7-x64
10Files/0b4a...e6.exe
windows10-2004-x64
10Files/0c10...54.rtf
windows7-x64
8Files/0c10...54.rtf
windows10-2004-x64
1Files/0dc6...d8.exe
windows7-x64
7Files/0dc6...d8.exe
windows10-2004-x64
7Files/0def...d1.exe
windows7-x64
5Files/0def...d1.exe
windows10-2004-x64
7Files/0f64...5d.exe
windows7-x64
10Files/0f64...5d.exe
windows10-2004-x64
10Files/0fe5...05.exe
windows7-x64
10Files/0fe5...05.exe
windows10-2004-x64
10Files/1150...16.exe
windows7-x64
8Files/1150...16.exe
windows10-2004-x64
10Files/11c8...ba.exe
windows7-x64
10Files/11c8...ba.exe
windows10-2004-x64
10Files/15e3...5e.exe
windows7-x64
8Files/15e3...5e.exe
windows10-2004-x64
8Files/1ca4...74.exe
windows7-x64
10Files/1ca4...74.exe
windows10-2004-x64
10Files/1dc7...d8.exe
windows7-x64
5Files/1dc7...d8.exe
windows10-2004-x64
5Files/1fb0...c1.exe
windows7-x64
3Files/1fb0...c1.exe
windows10-2004-x64
3Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 05:21
Behavioral task
behavioral1
Sample
Files/0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Files/0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Files/059cf78adefc07c8225fde4b20f705dfed5c8c90f0d360b84d941c432b99f76b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Files/059cf78adefc07c8225fde4b20f705dfed5c8c90f0d360b84d941c432b99f76b.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
Files/07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Files/07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Files/0b4a12968bf32f01c3aacc96ab4888e8b04f4ff334f903968afe452fec9bb2e6.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Files/0b4a12968bf32f01c3aacc96ab4888e8b04f4ff334f903968afe452fec9bb2e6.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
Files/0c10532495658ae6099011796249e76b9ef33235a019df54086bd07547685354.rtf
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Files/0c10532495658ae6099011796249e76b9ef33235a019df54086bd07547685354.rtf
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Files/0dc6fa2e838c3b03b801833f45d683b0cb27a787aa533e652e449f0456871cd8.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Files/0dc6fa2e838c3b03b801833f45d683b0cb27a787aa533e652e449f0456871cd8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Files/0def0868347c89485ceb5386573bce41ed3a83b343adc3308441f7822988c7d1.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Files/0def0868347c89485ceb5386573bce41ed3a83b343adc3308441f7822988c7d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Files/0f6481dabf7871823f259eb95f3b85c37d1de8a7d1884ac77a97d887cf96f75d.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
Files/0f6481dabf7871823f259eb95f3b85c37d1de8a7d1884ac77a97d887cf96f75d.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
Files/0fe572e7aad25a38ba9ee9b4600ddc02641e29061de250c525d6828f70326005.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Files/0fe572e7aad25a38ba9ee9b4600ddc02641e29061de250c525d6828f70326005.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Files/115059fe4fc5402a68c1e19acec336dd7cb180ef5433510d715d54e495e04316.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Files/115059fe4fc5402a68c1e19acec336dd7cb180ef5433510d715d54e495e04316.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Files/11c893b8175b916691afb56498a2a35c4fcf038a5f418e3ae7db3c66049abeba.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Files/11c893b8175b916691afb56498a2a35c4fcf038a5f418e3ae7db3c66049abeba.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
Files/15e3d2f2ae29c63206f13aa1768289a830ac2ef71c83227e3bc61a634ad7b05e.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Files/15e3d2f2ae29c63206f13aa1768289a830ac2ef71c83227e3bc61a634ad7b05e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Files/1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Files/1ca4a73b1076d2c6c0b97b3544919281b091e260f4970f62ae7f1cbcb9cc5e74.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Files/1dc75c16bf526f435cbdf05c73df57040791b7809d64e158b0b66565e444b3d8.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
Files/1dc75c16bf526f435cbdf05c73df57040791b7809d64e158b0b66565e444b3d8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Files/1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
Files/1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe
Resource
win10v2004-20250314-en
General
-
Target
Files/0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe
-
Size
988KB
-
MD5
f88d5cdc31b3c12a7229e96282dfeab2
-
SHA1
dd00a7281c5398b8db7a7a1f2f5168cb9eed4201
-
SHA256
0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a
-
SHA512
7969dcb95cb1f0e5ed15ebee31cc396186f874b80edb3a91b77b89a42f04080627d74db7455a2ba9d9732b1343b9729ee7f34e05282782fbdd6098748f5c19ce
-
SSDEEP
24576:rkhXHlJvh3QVsBNxJdN5dN+PMjyFOO8n/ebLPNB0AP:rq7phNJld0PMjyIx/ebLb02
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:2404
196.251.80.28:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-4U257D
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-4U257D = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-4U257D = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 drive.google.com 44 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1456 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 1456 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\bouts.ini 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Sharer.cam 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1456 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 95 PID 2928 wrote to memory of 1456 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 95 PID 2928 wrote to memory of 1456 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 95 PID 2928 wrote to memory of 1456 2928 0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Files\0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe"C:\Users\Admin\AppData\Local\Temp\Files\0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Files\0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe"C:\Users\Admin\AppData\Local\Temp\Files\0018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1456 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:4996
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:4320
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:5108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5c5b6ed57c78f93e1200a2b7f05af4d89
SHA1299326b64ab38fc50affed801b2959427e3b3853
SHA25670e7c4f9534d3ef250f0e2ad5cd2b68fba8eccba9e7d311e0c2ed08e6f340d5f
SHA5121895a78aa7c10c0642bbad00f82a5f869a1afa0581ff7d0e3fcd9070789c09d8bee216319ae3f5da5283bd9eb5c82fd8d1076f488f4ecd6b2b63e217f91b6a7e
-
Filesize
988KB
MD5f88d5cdc31b3c12a7229e96282dfeab2
SHA1dd00a7281c5398b8db7a7a1f2f5168cb9eed4201
SHA2560018f4feb99c7f12c3f5bfe53998c3c6ca7e2908f666f44a93f914c8c41c588a
SHA5127969dcb95cb1f0e5ed15ebee31cc396186f874b80edb3a91b77b89a42f04080627d74db7455a2ba9d9732b1343b9729ee7f34e05282782fbdd6098748f5c19ce
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3
-
Filesize
978B
MD5550c2c709c1f2bef9060addc9adc14fe
SHA1416c5ce37d90abdc73e128189d5165aee661fc74
SHA256dbadb2fa73e7bd75b75093bfdbc65f3ce54b06404f78e8b520f4370975b44f35
SHA512f1bad70fd725c6e98a5974bcd4325e47d89ebf3e927da7d3e31b390115e11db80d953d0508c7defcae5dd5e2ed0284414829fb6ffa6689d1572e51e747877998
-
Filesize
55KB
MD571d1f169b53bcd89b707db09f3644e10
SHA1ba0f2acdbed16976b9eed73ecef6550a3c757140
SHA256678bacc92f186ac64984a8b30977dc20d7f93860f9971548e2ff40343c19e2b5
SHA512eadc6e96640625c004f78053d0d531634aa548cf06247a8632bc1986294cbfcd87bd218c296a6ae31c77c888825db263382c48bc287a92dfc06901fe37759696
-
Filesize
365KB
MD579595450b13b674797651c41d2cbd277
SHA1dc051e07060137bb7946999d7e84e59540200a6e
SHA2565cd76f417cee47e718cd68818e79927c08b73a5856f99d626b961a19d2bd3c3f
SHA512ca192c9e66df05afd96dc44954e1cdbd7b78e43351ccfcdf10604bf680e61b48a7222e90676bc5908c719bf7b4929c94338a03e71df101ecfb04abe8e4beecc4
-
Filesize
41KB
MD5453d781111e7b91b658ac790c04110c8
SHA18a3f0ae328bde4710bff830248069ab55dd33cff
SHA256e42c92700f1675b86fdb7b11647c618cd643b06cccec6f0f69370d015b368c53
SHA5126f9664cd51033bea080f53d72032587574e97e3039759c40ecd3069f5f544d0a2b24e5d5acadefdb57cff9d43d91a5472b2650b423ebd865cdf39306b8dd6fde
-
Filesize
63KB
MD58375633e69b5c59e8d423e7793d243af
SHA16b07aceee1caa95a662448b6187211b0229c77b9
SHA256855fb2d922426885736d794b8c0562ededc07d539a11f48d38bd854baa9b0ae3
SHA5123ab354886e431cab67ce28ac05cd660493c389695000e3433c3cf7b0ab061ab2f407db4ffc88972f53a5c642a0f8c8cf87f4571d062fc70f68b052b806300fda
-
Filesize
724B
MD53c5b5e6fbd99bd2ea8428f2575c3c6c5
SHA1de1a70b0940697732049df888c26c8be6400486c
SHA2568fc19984ebcf318b3c3e4b254fe5d88e49701ad23726ad91077d345547e22616
SHA5124a56f3bd8589cb027c1aab173f350f656bf761002fcc3699447125ea550780954558929aecfb4fec5a03642df0d61005ca0986982ef26cbf54a59fa3b60bf9a0
-
Filesize
64KB
MD5644317d7a32c3566e78ff19c39f6d3b8
SHA1a45d151ca28401c0de79a0801e816820b2cb46a9
SHA256b36a03841b837fbb5d979ffdba5b752e1ca1d43bb5e675e2a5a86616002243c3
SHA512bff69f3f29a050fdbaf36e3c239650996dfe49123624754feb59b97cb314e4c16031042e11fc377355d837eaf202e0ee0aa0c313622dc7e475bf7a62dea53cfc
-
Filesize
6.9MB
MD53d566465a43c2dde384b9e9fad8cdcb4
SHA17c82cfe2c9502a638ffa4741e7c49c124928a926
SHA256e747cf908a51328e5c6bbb3ac9bf7fc7dfec2985652a1372b08b512f95d14fb2
SHA5124649965dfae9c3ac3ba08b455e84bc809c8fc5d54181935f3d484b4307c97c935799ececa5fc15f348846a259b1cf3a2e7fa21283e4b371e7bf4faf533b24028
-
Filesize
2KB
MD5d88d96c8733018f33e3834b11e173565
SHA1efde5014d4096a4274583341b6c28d9377634391
SHA25623dfd1f42c2e6ca766e7502c8a4e525e82541c0e9d3ec24b8b84cd28af5493d3
SHA5123f4e62ace3474c530b62477a32ace67a0db49c70fae37621c2beed4fd6a20f30c65c177b7335c16a8118f16727856104f334a7d3b33aa376891bdbbed71ddd17
-
Filesize
389B
MD5a163e287f4737c3d8cd2784bbe7394f8
SHA141da261fdd6bbd689e54e3c7ac9ab6d4b50990c2
SHA256237210000635b097f12ea590cbfb6b6d5eee341f492574cd08e634cc3ddd41c9
SHA512fd3d62d2110abd0098e5a28d05d78b5d7e06f61773bba0e115fb613bebf558f2f87385551f256859cab220608f42decb1ab92f6155d211bf9ce63331672ebb14
-
Filesize
6.6MB
MD58f924d04bc60e8128b3641c465be2d93
SHA1357be92f59b208db8e5e0b242b9953783d13e9a0
SHA25640c58cd8ac6fa470b51517e09c31c453910bd675548721d98a86e782ae54cab3
SHA512ee7bc90ad0f6f2cd3a2d3612c0be52d4d9137dcfe3c7fc15c9a59897bf474a6f21d54a22b3e47eda51d4551e66413b396a59fd5650cc7058370cb6a8e94087ac