Analysis
-
max time kernel
4s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe
Resource
win10v2004-20250314-en
General
-
Target
074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe
-
Size
372KB
-
MD5
58b02284e4a26bbd397e607af3a977bf
-
SHA1
3573ef3cedfb98b9c980ef2abe5e1c24f6bf7837
-
SHA256
074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da
-
SHA512
b4ce81164d5457ed5b9fee760bafba2ac382f06b4efaecbc6dbfd2fafad780401ed4a8a2b88e676a3229aa6cdfda2751db4b93b190eb0685e6ebf96da87c0e24
-
SSDEEP
6144:tFdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiy+:tnqQx+H2i+8LBNbdypazCXYc
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Remcos family
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation hab.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation hab.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation hab.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation remcos.exe -
Executes dropped EXE 12 IoCs
pid Process 3668 hab.exe 3152 hab.exe 4452 remcos.exe 4720 hab.exe 2384 remcos.exe 5768 hab.exe 2896 hab.exe 4800 hab.exe 2328 remcos.exe 1956 hab.exe 5928 remcos.exe 3164 hab.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe File opened for modification C:\Windows\win.ini 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings hab.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings hab.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings hab.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 3668 hab.exe 3668 hab.exe 3152 hab.exe 3152 hab.exe 4452 remcos.exe 4452 remcos.exe 4720 hab.exe 4720 hab.exe 2384 remcos.exe 2384 remcos.exe 5768 hab.exe 5768 hab.exe 2896 hab.exe 2896 hab.exe 4800 hab.exe 4800 hab.exe 2328 remcos.exe 1956 hab.exe 2328 remcos.exe 1956 hab.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 3668 hab.exe 3668 hab.exe 3152 hab.exe 3152 hab.exe 4452 remcos.exe 4452 remcos.exe 4720 hab.exe 4720 hab.exe 2384 remcos.exe 2384 remcos.exe 5768 hab.exe 5768 hab.exe 2896 hab.exe 2896 hab.exe 4800 hab.exe 4800 hab.exe 2328 remcos.exe 1956 hab.exe 2328 remcos.exe 1956 hab.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 3668 hab.exe 3152 hab.exe 4452 remcos.exe 4720 hab.exe 2384 remcos.exe 5768 hab.exe 2896 hab.exe 4800 hab.exe 2328 remcos.exe 1956 hab.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4520 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 86 PID 2176 wrote to memory of 4520 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 86 PID 2176 wrote to memory of 4520 2176 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 86 PID 4520 wrote to memory of 3668 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 87 PID 4520 wrote to memory of 3668 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 87 PID 4520 wrote to memory of 3668 4520 074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe 87 PID 3668 wrote to memory of 3152 3668 hab.exe 88 PID 3668 wrote to memory of 3152 3668 hab.exe 88 PID 3668 wrote to memory of 3152 3668 hab.exe 88 PID 6016 wrote to memory of 4416 6016 cmd.exe 94 PID 6016 wrote to memory of 4416 6016 cmd.exe 94 PID 3152 wrote to memory of 4392 3152 hab.exe 95 PID 3152 wrote to memory of 4392 3152 hab.exe 95 PID 3152 wrote to memory of 4392 3152 hab.exe 95 PID 3296 wrote to memory of 4452 3296 cmd.exe 96 PID 3296 wrote to memory of 4452 3296 cmd.exe 96 PID 3296 wrote to memory of 4452 3296 cmd.exe 96 PID 4416 wrote to memory of 4720 4416 wscript.exe 97 PID 4416 wrote to memory of 4720 4416 wscript.exe 97 PID 4416 wrote to memory of 4720 4416 wscript.exe 97 PID 4452 wrote to memory of 2384 4452 remcos.exe 98 PID 4452 wrote to memory of 2384 4452 remcos.exe 98 PID 4452 wrote to memory of 2384 4452 remcos.exe 98 PID 4720 wrote to memory of 5768 4720 hab.exe 99 PID 4720 wrote to memory of 5768 4720 hab.exe 99 PID 4720 wrote to memory of 5768 4720 hab.exe 99 PID 2384 wrote to memory of 2896 2384 remcos.exe 100 PID 2384 wrote to memory of 2896 2384 remcos.exe 100 PID 2384 wrote to memory of 2896 2384 remcos.exe 100 PID 2896 wrote to memory of 4800 2896 hab.exe 106 PID 2896 wrote to memory of 4800 2896 hab.exe 106 PID 2896 wrote to memory of 4800 2896 hab.exe 106 PID 5768 wrote to memory of 3744 5768 hab.exe 107 PID 5768 wrote to memory of 3744 5768 hab.exe 107 PID 5768 wrote to memory of 3744 5768 hab.exe 107 PID 4708 wrote to memory of 3624 4708 cmd.exe 161 PID 4708 wrote to memory of 3624 4708 cmd.exe 161 PID 4884 wrote to memory of 2328 4884 cmd.exe 109 PID 4884 wrote to memory of 2328 4884 cmd.exe 109 PID 4884 wrote to memory of 2328 4884 cmd.exe 109 PID 3624 wrote to memory of 1956 3624 wscript.exe 110 PID 3624 wrote to memory of 1956 3624 wscript.exe 110 PID 3624 wrote to memory of 1956 3624 wscript.exe 110 PID 2328 wrote to memory of 5928 2328 remcos.exe 117 PID 2328 wrote to memory of 5928 2328 remcos.exe 117 PID 2328 wrote to memory of 5928 2328 remcos.exe 117 PID 1956 wrote to memory of 3164 1956 hab.exe 118 PID 1956 wrote to memory of 3164 1956 hab.exe 118 PID 1956 wrote to memory of 3164 1956 hab.exe 118 PID 4800 wrote to memory of 2796 4800 hab.exe 119 PID 4800 wrote to memory of 2796 4800 hab.exe 119 PID 4800 wrote to memory of 2796 4800 hab.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe"C:\Users\Admin\AppData\Local\Temp\074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe"C:\Users\Admin\AppData\Local\Temp\074657bfa64655c09b1c9da889242222fa965fbc3295de7de7c04378f9bdb8da.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:6016 -
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:2796
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:5324
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵
- Executes dropped EXE
PID:5928 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:432
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:1752
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:4112
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3408
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:2940
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:1912
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5112
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:4480
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:2444
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:3984
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3052
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:3444
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5288
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:1916
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:3984
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:4328
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1976
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:4888
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:3848
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4452
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5240
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:4432
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3016
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:4540
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:2236
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:5844
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:4592
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4936
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:2752
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5852
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5256
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3624
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:6024
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:5548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:1972
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5292
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5980
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:2760
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:6120
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4576
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5cabfcf93820fa46724f3a953b3b476e7
SHA1318bf7074cc1dd4a98f22c46393aacbc802e47ed
SHA25691623c1d6ca7d812346058fe3c9fc93e9ce0654c951c14c6d1bebf1f70697585
SHA512a22490f04b3163ec84ab3a79de68c4cfea647864377ccc5c247a0531eeefdd7f9730b5a26ce38029c68d6e292735a67791d66c47121ba18c0fb636adba444486
-
Filesize
92B
MD5924c10de3467040c668a0c01b7b3f6b7
SHA124e7f554808c9047bd74448023727aeffafd5ba9
SHA2560045a1cae6a54111951d5f03d8843e250001405742937683744bec9afb4ff0f4
SHA512feaa18c4c36c54e3bfba5a8c4b57f7088ad05887b91f1a6384af5ea2c54cb39ebd7930b4e6e23ddc18938ff0f4c041083dbe03362c8811c2d0274002459578f0
-
Filesize
536B
MD5b4118bddcc9fe0ae73396b2b1b58c970
SHA123afa06fa78bbcc9c11e8549681fd4956f9d6c45
SHA256e5d5005f7c9fdada426273f14e2ebe328b84f9161e80acc1396dadbe9897e98f
SHA512fdc29fb8fafb990e52487b9ec22140dcbc8c684efa53da41e348584c623fff1a7ce1a9b3deaccdb25867479b393d52d199c8f09cb365e6c84e5980f6d4285b67
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06