Analysis
-
max time kernel
59s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe
Resource
win10v2004-20250314-en
General
-
Target
5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe
-
Size
1.1MB
-
MD5
7f30e6c7d2f495fc82bd2f4c1f9055db
-
SHA1
f7878fdb41c01912606c4fee325e66e5af915749
-
SHA256
5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158
-
SHA512
98e5d9777ca949a4a3701624bf1bdd0e720ff7cb861cc471aeb970505b59aad0b8e451a44ea1ba8d6f04e84118a3a64207777890d69b8da97a99ba5f30a10fef
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FP:LTgdZOcuUL3xAx/8b2S7Z0J
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 1 IoCs
pid Process 2840 AboutSettingsHandlers.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2380-21-0x0000000001380000-0x0000000001509000-memory.dmp autoit_exe behavioral1/memory/2380-26-0x0000000001380000-0x0000000001509000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2396 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 30 PID 2380 wrote to memory of 2820 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 32 PID 2380 wrote to memory of 2820 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 32 PID 2380 wrote to memory of 2820 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 32 PID 2380 wrote to memory of 2820 2380 5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe 32 PID 2708 wrote to memory of 2840 2708 taskeng.exe 35 PID 2708 wrote to memory of 2840 2708 taskeng.exe 35 PID 2708 wrote to memory of 2840 2708 taskeng.exe 35 PID 2708 wrote to memory of 2840 2708 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe"C:\Users\Admin\AppData\Local\Temp\5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe"C:\Users\Admin\AppData\Local\Temp\5345d8164a2e6bf63a10a7c7a7a56da17e7c5c6e0f128cd9381808b8f1d30158.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E18F1D24-1333-47A3-ABD7-8FA282D2C29D} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a126baf6d945012e2bbd77247523b337
SHA158706db1572b34d64250692ada782b29cfe2eec9
SHA256024e271dd4a8ddce6e0903ddcaea2d8300e8e86d902abc276c08cc1db85933b2
SHA51221a33f4de34ddad273c491e05d56c909df956f772f58ba1dbbd287f8008ef4b7d8a9f434f731a0d77cc43f85d6f9487638da0eb2ccfd2de216b92c6f3d4b2f11
-
Filesize
79B
MD5be2c07b3f674bc26f1cf903d96fa6231
SHA1e31d08403339e549961dec012d3a01d6d36ac9fa
SHA256121f88ab90e035fc3814dd3ec92a387a37efe5e020c6ae5f05c7121850c4d327
SHA51265244ce9839488a553c45e177a96c1dac53eeb4df8f47bd9107c95a3a856dcc22592c71aba277c20b8c6eeefb5f7e9d02ccc51893c369d44924cbc962c4c77ad