Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
Resource
win10v2004-20250314-en
General
-
Target
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe
-
Size
1.1MB
-
MD5
20e60d89e273331ee5c9c55168663c10
-
SHA1
43f4f20722481704800a8a14eb83c5ee1d7c3d29
-
SHA256
cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1
-
SHA512
1fc31a9915419dd6a7c1598eb8e80189fff16448e49835a53fa950e2f62e41f7753b16ff3d2019a1c74fcf5b8d4657c244471918f39c6d82345e07d5dd51d318
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FS:LTgdZOcuUL3xAx/8b2S7Z0k
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation AboutSettingsHandlers.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation AboutSettingsHandlers.exe -
Executes dropped EXE 4 IoCs
pid Process 3228 AboutSettingsHandlers.exe 2796 AboutSettingsHandlers.exe 3120 AboutSettingsHandlers.exe 4400 AboutSettingsHandlers.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2228-16-0x0000000000950000-0x0000000000AD9000-memory.dmp autoit_exe behavioral2/memory/2228-19-0x0000000000950000-0x0000000000AD9000-memory.dmp autoit_exe behavioral2/memory/2228-22-0x0000000000950000-0x0000000000AD9000-memory.dmp autoit_exe behavioral2/memory/3228-41-0x0000000000610000-0x0000000000799000-memory.dmp autoit_exe behavioral2/memory/3228-43-0x0000000000610000-0x0000000000799000-memory.dmp autoit_exe behavioral2/memory/3228-44-0x0000000000610000-0x0000000000799000-memory.dmp autoit_exe behavioral2/memory/3120-59-0x0000000000610000-0x0000000000799000-memory.dmp autoit_exe behavioral2/memory/3120-61-0x0000000000610000-0x0000000000799000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2228 set thread context of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 3228 set thread context of 2796 3228 AboutSettingsHandlers.exe 108 PID 3120 set thread context of 4400 3120 AboutSettingsHandlers.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3876 schtasks.exe 5800 schtasks.exe 5720 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4924 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 2228 wrote to memory of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 2228 wrote to memory of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 2228 wrote to memory of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 2228 wrote to memory of 4924 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 93 PID 2228 wrote to memory of 3876 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 97 PID 2228 wrote to memory of 3876 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 97 PID 2228 wrote to memory of 3876 2228 cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe 97 PID 3228 wrote to memory of 2796 3228 AboutSettingsHandlers.exe 108 PID 3228 wrote to memory of 2796 3228 AboutSettingsHandlers.exe 108 PID 3228 wrote to memory of 2796 3228 AboutSettingsHandlers.exe 108 PID 3228 wrote to memory of 2796 3228 AboutSettingsHandlers.exe 108 PID 3228 wrote to memory of 2796 3228 AboutSettingsHandlers.exe 108 PID 3228 wrote to memory of 5800 3228 AboutSettingsHandlers.exe 110 PID 3228 wrote to memory of 5800 3228 AboutSettingsHandlers.exe 110 PID 3228 wrote to memory of 5800 3228 AboutSettingsHandlers.exe 110 PID 3120 wrote to memory of 4400 3120 AboutSettingsHandlers.exe 113 PID 3120 wrote to memory of 4400 3120 AboutSettingsHandlers.exe 113 PID 3120 wrote to memory of 4400 3120 AboutSettingsHandlers.exe 113 PID 3120 wrote to memory of 4400 3120 AboutSettingsHandlers.exe 113 PID 3120 wrote to memory of 4400 3120 AboutSettingsHandlers.exe 113 PID 3120 wrote to memory of 5720 3120 AboutSettingsHandlers.exe 114 PID 3120 wrote to memory of 5720 3120 AboutSettingsHandlers.exe 114 PID 3120 wrote to memory of 5720 3120 AboutSettingsHandlers.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"C:\Users\Admin\AppData\Local\Temp\cb56004f9171776bc09c3796fbead68b88f75564787c8ee2f03294099d1c78f1.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3876
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5800
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:4400
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5670983004d7dc332b12aac7f497aaea4
SHA1936db31ea7e08ff8ac72d29221ede27941d23008
SHA25620819a6f878b22c3321f7657eb18b1dfe90de9648eee7ed9ad41a9476a6df3e0
SHA51273a38ccf8cb2e645a8ab2e153aed98272e20e5ac53111da796048dbcd25822fbb1e8845b1fe06a8ad87b5d31cd4ffe47f19337c091ed2527c862c74f8ac2a26a
-
Filesize
79B
MD52204a33a069170020acecf6def03620b
SHA1cb7c0ef3b4437161458ddb0fb6f19f4cb33506cc
SHA256d15e374cf1bc8cfe2d15b106e5b51fa5f863801e9ba8b3a391213a6d19947db7
SHA51208ef660c1f56d47ffab3ccd0255f023ac4d46a3b4ac1cd56d124e70ff74cb03679e49659b5749aa3beada530736f7c8c71216ca9f2a32f3f01f76517c5ca4e6a