Analysis
-
max time kernel
58s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
Resource
win10v2004-20250314-en
General
-
Target
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
-
Size
1.1MB
-
MD5
d447175eba4179d0762edb381a2e329e
-
SHA1
a12689090c983f2bfab8fcfc34feff23205c9db2
-
SHA256
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480
-
SHA512
765275ffc53be3cd77bd2420feaa705929f335b59c2267f411cc6c30b3c6c5e5e73f57e7605e082ce0ea88176734b56a1e9da21af05c936621c6b662471c5b6a
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0F0:LTgdZOcuUL3xAx/8b2S7Z0e
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2668 AboutSettingsHandlers.exe 3040 AboutSettingsHandlers.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2444-20-0x0000000000A80000-0x0000000000C09000-memory.dmp autoit_exe behavioral1/memory/2444-25-0x0000000000A80000-0x0000000000C09000-memory.dmp autoit_exe behavioral1/memory/2668-43-0x0000000000930000-0x0000000000AB9000-memory.dmp autoit_exe behavioral1/memory/2668-46-0x0000000000930000-0x0000000000AB9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2444 set thread context of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2668 set thread context of 3040 2668 AboutSettingsHandlers.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 2624 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2448 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 30 PID 2444 wrote to memory of 2624 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 31 PID 2444 wrote to memory of 2624 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 31 PID 2444 wrote to memory of 2624 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 31 PID 2444 wrote to memory of 2624 2444 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 31 PID 2592 wrote to memory of 2668 2592 taskeng.exe 34 PID 2592 wrote to memory of 2668 2592 taskeng.exe 34 PID 2592 wrote to memory of 2668 2592 taskeng.exe 34 PID 2592 wrote to memory of 2668 2592 taskeng.exe 34 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 3040 2668 AboutSettingsHandlers.exe 35 PID 2668 wrote to memory of 2824 2668 AboutSettingsHandlers.exe 36 PID 2668 wrote to memory of 2824 2668 AboutSettingsHandlers.exe 36 PID 2668 wrote to memory of 2824 2668 AboutSettingsHandlers.exe 36 PID 2668 wrote to memory of 2824 2668 AboutSettingsHandlers.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {651ED465-9EB7-47A6-9A09-78DE6CDC7BA3} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52d3ff6d476ec268d6e51fb98e9557482
SHA1afff2b116f9365653f784f7efe36d29ee5408e75
SHA256f482eb76e65a2e9d9392fb255a00d271346fb95501040f9e7bc84eee3c7f4c76
SHA512dbb94a7319609b0582fde6f669ff481d3ff51f5b6481086a82bfd46fd7fa162c77b6afe06a99f99f01cf6192a43a463ab748ec1a175c5e725cdd14bc18835678
-
Filesize
79B
MD582c9e17ed62bab83f06e92b2d80365c1
SHA16973fe978e6323ff74a82658c7e0b6523405f397
SHA25668d360850a656d081cb48cafceb6ec4f011b63f08798eddde757f482a5b1f383
SHA512a40fb5fd7a4e100038fd80aa24cbd1a1bee3ca61095c014a44423fcf59074c010b63adb4b08c234522a5f685251a1041d1190a4d48ef23565bd1566e911bed39