Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 18:40

General

  • Target

    Main_Order.vbs

  • Size

    963B

  • MD5

    8b5f64100174bb8bafd5ad78d6f2b277

  • SHA1

    f284046c61b75fd44bf55661701c5e15b97efb28

  • SHA256

    64f8d40a94818b9385624dc6237edee725cc7edf78c09da9fd60454a7b1e2cdc

  • SHA512

    ddf8052d129252ff570e2fe21a06a69978cea57b43b75ce6f1dff2a3cb6674df9e5ff6ecec78ef3192e17841c9903823c194e2153fcbaec5268f87bc7dcf7346

Malware Config

Extracted

Family

remcos

Botnet

Thales 10101

C2

103.28.89.34:10101

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    process.exe

  • copy_folder

    Tencent

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-HP44IR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Main_Order.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\DownloadedScript.ps1"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gFnEPEuEhX.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp85B3.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2012
        • C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:284
          • C:\ProgramData\Tencent\process.exe
            "C:\ProgramData\Tencent\process.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1500
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Tencent\process.exe"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2928
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gFnEPEuEhX.exe"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1772
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gFnEPEuEhX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD47E.tmp"
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1492
            • C:\ProgramData\Tencent\process.exe
              "C:\ProgramData\Tencent\process.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2020
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3056
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    a7a82851e225c52a26dc43542844a981

    SHA1

    6bb22e1a4eb81a7c2b29ae3e10d460e8ef3ee3e2

    SHA256

    904e92898b7bd69f44aab958a0d39ba3a0243df0144b9def5c398979f7de57b6

    SHA512

    6df5ec52ad8d061891a538bc4f0eac857544177a032b44a504ea08b851bb6b3c3687cecf93b164756b14a1362f6ec4373aff33888129ff28a2cd1bc131e97c88

  • C:\Users\Admin\AppData\Local\Temp\DownloadedScript.ps1

    Filesize

    1.3MB

    MD5

    642647cf863119977d7bd52e848e0cfe

    SHA1

    e72fff2ea6ed161b3d3d6f22c23551b5df46d965

    SHA256

    7eb324d64219307096ea286640458671dc964fb218395d775dc5fe5e7f339e00

    SHA512

    6c5a9d36008c6b88735646517d62706ccd1713fa15beafdee6ca5e0fb3977bb770fc9ecf9111b82b6dcd6c126fc18f6655f195027f72df159a2e63f9c61c734b

  • C:\Users\Admin\AppData\Local\Temp\tmp30E0.exe

    Filesize

    973KB

    MD5

    6b2ea6f71bd2165cc92875b0b87862de

    SHA1

    913189ac1120dd8aa61658c53e71a0b9c2908c46

    SHA256

    e5aa1acd8c864164ebb1e0c2cfede53df7791f504c1eb1faa15d5f637e938ebd

    SHA512

    b7c207b47738b43b5ee398ac325a5ebc588a74a5b3b16b4f864bf7feff92c627549b3523a1f302b6a42c66803055a931fbf5d181bba7f0c28d770dcc3d146d4a

  • C:\Users\Admin\AppData\Local\Temp\tmp85B3.tmp

    Filesize

    1KB

    MD5

    56e99e3854af6f2ffed90430957cb1c8

    SHA1

    70a6aa13ac624339bd2349c920c7bab590f43645

    SHA256

    80662de69b598196f2928d3cee291320ba90fa4bbaee6151e7b7f8fe45dfecaa

    SHA512

    6409fcced7f4d115412e9d93bfe1a0294b3dac9c78a81626d3afaebcb7a348215ef9ead2ee441f1809aa9c95a626d1aa710853d77c664ae81d156cc5dc1313da

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6YD3VLWVWAR2FIQQF2H1.temp

    Filesize

    7KB

    MD5

    cb07b3553a22865a9d7173dfff10d87c

    SHA1

    b5a4bd56afe3e5a94fe165d739fde8a76743fa0a

    SHA256

    a9b826e0973782e6cadf61246eab9bb3fd58203fac20551b08a9d6135a33ebc3

    SHA512

    73dacb92c6d4d43903a6d905019d2afd423c735dedf6e48a185d30d06ed1442ca4c8c2af23505a9f5f57aa88ccb6adb3680851a1f9f65633a70211a3be33f225

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    4539973f05ae1a37719884993cd43cc0

    SHA1

    049286ae3ffcce5b78ae1f8e884a8d7b03b5bb03

    SHA256

    87af1d7fa29f65d7996bf939c3461b81f2f182a065ce0f7d30ff46083cd730a0

    SHA512

    069e835d7ba1f37929cc6e11032ccd3211399b9caa802c0e27159511a16c2267d733bfa2c90c2ac73b730c504765abeef13ce0e04e75dd1480a5a87de077a1a0

  • memory/284-45-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-44-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-41-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-47-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-49-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-51-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/284-52-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-54-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/284-39-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/1500-62-0x00000000012D0000-0x00000000013C4000-memory.dmp

    Filesize

    976KB

  • memory/2020-122-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-128-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-112-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-105-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-106-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-90-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-111-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-127-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-121-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-99-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-97-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-96-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-93-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/2020-87-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2580-23-0x0000000000480000-0x0000000000498000-memory.dmp

    Filesize

    96KB

  • memory/2580-24-0x0000000005F40000-0x0000000006004000-memory.dmp

    Filesize

    784KB

  • memory/2580-21-0x00000000013D0000-0x00000000014C4000-memory.dmp

    Filesize

    976KB

  • memory/2596-6-0x000007FEF58AE000-0x000007FEF58AF000-memory.dmp

    Filesize

    4KB

  • memory/2596-22-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-13-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-12-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-10-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2596-8-0x0000000001E70000-0x0000000001E78000-memory.dmp

    Filesize

    32KB

  • memory/2596-7-0x000000001B720000-0x000000001BA02000-memory.dmp

    Filesize

    2.9MB

  • memory/3056-91-0x00000000043F0000-0x00000000043F1000-memory.dmp

    Filesize

    4KB