Analysis
-
max time kernel
58s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win10v2004-20250314-en
General
-
Target
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
-
Size
1.1MB
-
MD5
20e60d89e273331ee5c9c55168663c10
-
SHA1
43f4f20722481704800a8a14eb83c5ee1d7c3d29
-
SHA256
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1
-
SHA512
1fc31a9915419dd6a7c1598eb8e80189fff16448e49835a53fa950e2f62e41f7753b16ff3d2019a1c74fcf5b8d4657c244471918f39c6d82345e07d5dd51d318
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FS:LTgdZOcuUL3xAx/8b2S7Z0k
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Executes dropped EXE 2 IoCs
pid Process 1920 AboutSettingsHandlers.exe 2044 AboutSettingsHandlers.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4164-16-0x0000000000D10000-0x0000000000E99000-memory.dmp autoit_exe behavioral2/memory/4164-19-0x0000000000D10000-0x0000000000E99000-memory.dmp autoit_exe behavioral2/memory/4164-22-0x0000000000D10000-0x0000000000E99000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4164 set thread context of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 1920 set thread context of 2044 1920 AboutSettingsHandlers.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3412 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4164 wrote to memory of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 4164 wrote to memory of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 4164 wrote to memory of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 4164 wrote to memory of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 4164 wrote to memory of 5020 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 94 PID 4164 wrote to memory of 3412 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 98 PID 4164 wrote to memory of 3412 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 98 PID 4164 wrote to memory of 3412 4164 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 98 PID 1920 wrote to memory of 2044 1920 AboutSettingsHandlers.exe 109 PID 1920 wrote to memory of 2044 1920 AboutSettingsHandlers.exe 109 PID 1920 wrote to memory of 2044 1920 AboutSettingsHandlers.exe 109 PID 1920 wrote to memory of 2044 1920 AboutSettingsHandlers.exe 109 PID 1920 wrote to memory of 2044 1920 AboutSettingsHandlers.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3412
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5edf2cfc8ab9f9d7501e4aa738fc5649a
SHA17aeed5c96a6b8530bdead8bf4f2655e0558e9b67
SHA2561f54f02f6f41da4b87d9227eec489835b8d830c59f6e3016925de164498d226e
SHA5124abf87062b43820ca22115d2503ea9ebc190ff81065cfb6cf1fb85fa0c9d11a59d0a852508322b527ec45f3b5aedecb822ceed60e67b8a6f7a9de2f60f4dbcb3
-
Filesize
79B
MD582e132ec3201ee46c55cab3fbd11f158
SHA11dc8bc0d34d0f32125a8a2dbd18cfa25347a25e0
SHA2561145916f3cda54b2d47fed8652f231f6f862f73141a08e467563fa069f331288
SHA512837aee501c1db1df21077b03403642b8822978d0283895121339b307a66faa94e264db8e4ca33e9c1976e7204bdbd4f124605a6cf37d8b4de0c44bb721f6b126