Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe
Resource
win10v2004-20250314-en
General
-
Target
eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe
-
Size
368KB
-
MD5
3b6f01867a856980aebf4bfefd580b05
-
SHA1
aabfde9fa7910ff59d6a2fd4de8f2280e4554695
-
SHA256
eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34
-
SHA512
df27c242f07c2ba0c8b2f526a189b3ba9fea78c75aa63da57f982c5d6a55ba73ba2e934f9f0ccbff68c9cb2795810f2d5f6b9f4bd6b87da4007f592512df77f7
-
SSDEEP
3072:tRFhJsebNVlW1NWgxLJOp6iJRejPoQKvHIbuduaqyuhjDxSIVbOfprMIYsMMgC6U:tRF3VoweHW0u8TDB4ty3huYu
Malware Config
Extracted
remcos
2.4.3 Pro
Talentino
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-KG5D4I
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2548 nas0.exe 980 nas0.exe -
Loads dropped DLL 3 IoCs
pid Process 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2548 nas0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\men0 = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\nas0.vbs\"" nas0.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2552 set thread context of 2176 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 30 PID 2548 set thread context of 980 2548 nas0.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe File opened for modification C:\Windows\win.ini eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe File opened for modification C:\Windows\win.ini nas0.exe File opened for modification C:\Windows\win.ini nas0.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nas0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nas0.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2548 nas0.exe 2548 nas0.exe 980 nas0.exe 980 nas0.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2548 nas0.exe 2548 nas0.exe 980 nas0.exe 980 nas0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 2548 nas0.exe 980 nas0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2176 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 30 PID 2552 wrote to memory of 2176 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 30 PID 2552 wrote to memory of 2176 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 30 PID 2552 wrote to memory of 2176 2552 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 30 PID 2176 wrote to memory of 2548 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 31 PID 2176 wrote to memory of 2548 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 31 PID 2176 wrote to memory of 2548 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 31 PID 2176 wrote to memory of 2548 2176 eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe 31 PID 2548 wrote to memory of 980 2548 nas0.exe 32 PID 2548 wrote to memory of 980 2548 nas0.exe 32 PID 2548 wrote to memory of 980 2548 nas0.exe 32 PID 2548 wrote to memory of 980 2548 nas0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe"C:\Users\Admin\AppData\Local\Temp\eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe"C:\Users\Admin\AppData\Local\Temp\eb5bcadcc3f76a63527061c741dbc47b3a538cef9a46b8d0feb502eae64b6f34.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\nas0.exe"C:\Users\Admin\AppData\Local\Temp\nas0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\nas0.exe"C:\Users\Admin\AppData\Local\Temp\nas0.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
368KB
MD555d309908ea8c683ae94e9c2a9c03df3
SHA1ff990b1d1c5c1cb679dcc3d7a4217022def7c7a1
SHA256fda4908eb13f6539b8c4eb000792de7f2cc6069c1edd7d68fdd39d41587792ad
SHA512a45c32791980ead77f8cf1dce5a489d1f74309183eafb59305e050e2f9fb0ecd0f7ff82dae9370790348354ae3fc3ae6f4d7f4cd28633183a74908f5262d3634