Analysis
-
max time kernel
59s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
Resource
win10v2004-20250314-en
General
-
Target
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe
-
Size
1.1MB
-
MD5
d447175eba4179d0762edb381a2e329e
-
SHA1
a12689090c983f2bfab8fcfc34feff23205c9db2
-
SHA256
ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480
-
SHA512
765275ffc53be3cd77bd2420feaa705929f335b59c2267f411cc6c30b3c6c5e5e73f57e7605e082ce0ea88176734b56a1e9da21af05c936621c6b662471c5b6a
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0F0:LTgdZOcuUL3xAx/8b2S7Z0e
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 AboutSettingsHandlers.exe 5052 AboutSettingsHandlers.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5040-16-0x00000000005F0000-0x0000000000779000-memory.dmp autoit_exe behavioral2/memory/5040-19-0x00000000005F0000-0x0000000000779000-memory.dmp autoit_exe behavioral2/memory/5040-22-0x00000000005F0000-0x0000000000779000-memory.dmp autoit_exe behavioral2/memory/3176-40-0x0000000000E30000-0x0000000000FB9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5040 set thread context of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 3176 set thread context of 5052 3176 AboutSettingsHandlers.exe 120 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4668 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 5040 wrote to memory of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 5040 wrote to memory of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 5040 wrote to memory of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 5040 wrote to memory of 1796 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 100 PID 5040 wrote to memory of 4668 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 104 PID 5040 wrote to memory of 4668 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 104 PID 5040 wrote to memory of 4668 5040 ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe 104 PID 3176 wrote to memory of 5052 3176 AboutSettingsHandlers.exe 120 PID 3176 wrote to memory of 5052 3176 AboutSettingsHandlers.exe 120 PID 3176 wrote to memory of 5052 3176 AboutSettingsHandlers.exe 120 PID 3176 wrote to memory of 5052 3176 AboutSettingsHandlers.exe 120 PID 3176 wrote to memory of 5052 3176 AboutSettingsHandlers.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"C:\Users\Admin\AppData\Local\Temp\ef71e4faa0bfff9dde2a35b462b3ff945f456f7e7717dd7913734d39e0c7a480.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4668
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52d3ff6d476ec268d6e51fb98e9557482
SHA1afff2b116f9365653f784f7efe36d29ee5408e75
SHA256f482eb76e65a2e9d9392fb255a00d271346fb95501040f9e7bc84eee3c7f4c76
SHA512dbb94a7319609b0582fde6f669ff481d3ff51f5b6481086a82bfd46fd7fa162c77b6afe06a99f99f01cf6192a43a463ab748ec1a175c5e725cdd14bc18835678
-
Filesize
79B
MD526efcdc5195bfd00b70d48ff03085d87
SHA15e9d9ab3332597c12f9419ac38a2356eb60456b2
SHA25667ce01c7834fb73b169c97231201ad015668cad6014d1438dc6145eb14afe182
SHA512da9795decb44620d481ec6950ca8a467bc2d1c79b33ca5115a24704fdd63f230cbb951f0910719b1045ce33e2d3b0d1d03f88cbfac1e29cd342b69c361dadbc2