Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe
Resource
win10v2004-20250314-en
General
-
Target
828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe
-
Size
372KB
-
MD5
04cae2b318dbfbb8a5fc80070bed1533
-
SHA1
d76a47b195c3c138c9b3eff088992252f584b475
-
SHA256
828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92
-
SHA512
a1d971896e473b711cd05b1c97cb60b1eacce38ce0a66e18b5d8902fe8e89b1000e6dece9363a0478e808e146fc36699b5ae2b8bd266723f0590711d1fd12095
-
SSDEEP
6144:tKdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhi2e:tgqQx+H2i+8LBNbdypazCXYI
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2272 hab.exe 2892 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2272 hab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1816 set thread context of 2728 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 30 PID 2272 set thread context of 2892 2272 hab.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe File opened for modification C:\Windows\win.ini 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2272 hab.exe 2272 hab.exe 2892 hab.exe 2892 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2272 hab.exe 2272 hab.exe 2892 hab.exe 2892 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 2272 hab.exe 2892 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2728 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 30 PID 1816 wrote to memory of 2728 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 30 PID 1816 wrote to memory of 2728 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 30 PID 1816 wrote to memory of 2728 1816 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 30 PID 2728 wrote to memory of 2272 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 31 PID 2728 wrote to memory of 2272 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 31 PID 2728 wrote to memory of 2272 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 31 PID 2728 wrote to memory of 2272 2728 828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe 31 PID 2272 wrote to memory of 2892 2272 hab.exe 32 PID 2272 wrote to memory of 2892 2272 hab.exe 32 PID 2272 wrote to memory of 2892 2272 hab.exe 32 PID 2272 wrote to memory of 2892 2272 hab.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe"C:\Users\Admin\AppData\Local\Temp\828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe"C:\Users\Admin\AppData\Local\Temp\828f90ee9ac1319f3a13fdb52ea902cad7efa5c202e70257826056ae3ea15e92.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD586b239c91dd6e1297aef96712b5b2b34
SHA102100c07da2a9d7a267a9fc1ff8e4b744d6ff3c7
SHA2562a63ab1bf9b898dc012ef857c8ccacc4bff6076b059be0207990a53070e10576
SHA512d1eb193c06744797149b6218379d14e9de3aaf1e740c25638dd62e5cbf60051e980c29fb4712a7a399b2cdd1df3271addbafbe461d908bbe838585b9040f8337