Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win10v2004-20250314-en
General
-
Target
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
-
Size
1.1MB
-
MD5
20e60d89e273331ee5c9c55168663c10
-
SHA1
43f4f20722481704800a8a14eb83c5ee1d7c3d29
-
SHA256
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1
-
SHA512
1fc31a9915419dd6a7c1598eb8e80189fff16448e49835a53fa950e2f62e41f7753b16ff3d2019a1c74fcf5b8d4657c244471918f39c6d82345e07d5dd51d318
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FS:LTgdZOcuUL3xAx/8b2S7Z0k
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 4 IoCs
pid Process 2888 AboutSettingsHandlers.exe 2648 AboutSettingsHandlers.exe 1972 AboutSettingsHandlers.exe 1748 AboutSettingsHandlers.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2400-21-0x00000000009D0000-0x0000000000B59000-memory.dmp autoit_exe behavioral1/memory/2400-26-0x00000000009D0000-0x0000000000B59000-memory.dmp autoit_exe behavioral1/memory/2888-47-0x0000000000240000-0x00000000003C9000-memory.dmp autoit_exe behavioral1/memory/2888-50-0x0000000000240000-0x00000000003C9000-memory.dmp autoit_exe behavioral1/memory/1972-69-0x0000000001350000-0x00000000014D9000-memory.dmp autoit_exe behavioral1/memory/1972-72-0x0000000001350000-0x00000000014D9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2400 set thread context of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2888 set thread context of 2648 2888 AboutSettingsHandlers.exe 36 PID 1972 set thread context of 1748 1972 AboutSettingsHandlers.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe 2644 schtasks.exe 2036 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2988 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 30 PID 2400 wrote to memory of 2320 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 2400 wrote to memory of 2320 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 2400 wrote to memory of 2320 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 2400 wrote to memory of 2320 2400 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 32 PID 2744 wrote to memory of 2888 2744 taskeng.exe 35 PID 2744 wrote to memory of 2888 2744 taskeng.exe 35 PID 2744 wrote to memory of 2888 2744 taskeng.exe 35 PID 2744 wrote to memory of 2888 2744 taskeng.exe 35 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2648 2888 AboutSettingsHandlers.exe 36 PID 2888 wrote to memory of 2644 2888 AboutSettingsHandlers.exe 37 PID 2888 wrote to memory of 2644 2888 AboutSettingsHandlers.exe 37 PID 2888 wrote to memory of 2644 2888 AboutSettingsHandlers.exe 37 PID 2888 wrote to memory of 2644 2888 AboutSettingsHandlers.exe 37 PID 2744 wrote to memory of 1972 2744 taskeng.exe 39 PID 2744 wrote to memory of 1972 2744 taskeng.exe 39 PID 2744 wrote to memory of 1972 2744 taskeng.exe 39 PID 2744 wrote to memory of 1972 2744 taskeng.exe 39 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 1748 1972 AboutSettingsHandlers.exe 40 PID 1972 wrote to memory of 2036 1972 AboutSettingsHandlers.exe 41 PID 1972 wrote to memory of 2036 1972 AboutSettingsHandlers.exe 41 PID 1972 wrote to memory of 2036 1972 AboutSettingsHandlers.exe 41 PID 1972 wrote to memory of 2036 1972 AboutSettingsHandlers.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2320
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {152A2D75-377D-4C15-B997-DFC879B3C2CE} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2644
-
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:1748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD551feefadf93eb099a4753505d7e090f9
SHA1fa7d5af93119e9e74396ac33782007ff27970b15
SHA256e879253213dc7701cc27995ae1439578b32e2652238bce13162c85f1969c0020
SHA512e92fcf563bbe9d4b5fd58728bdd38a808a0c3b16bbbdf2cd3dac88f579accd72aafcf246d2a21be8d6925200139b53e007d101464e576f871816db95540be0c6
-
Filesize
79B
MD59f3acb5a0dc08c626dfb39057317a58a
SHA10a764836d7e0ede8eb2deb929ecd13d7fe09577d
SHA256485a447023276939122bdc948b9036ba310caca9c56ecdadb65fb8e661a776ad
SHA51268298d205e0791ebd016faa6c869354b8e535e8cdb0ce884920331ab1dd964905582eaa2f40fc633a3d12e456f622c435bdd534d01cf9f6383057381cb3662dc