Analysis
-
max time kernel
58s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe
Resource
win10v2004-20250314-en
General
-
Target
fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe
-
Size
1.1MB
-
MD5
08d4a690d8a5f57b996465457d0f4775
-
SHA1
8059aa4a63ee35a7505dd55f9a4d8f63f02bfa78
-
SHA256
fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d
-
SHA512
8c08c78371e4d645a58aa32ca1549eecdc9466300212cd0b06fcda4d3a4470f2c67003ac5ad93180f2c7e34479b2a00d127aac7507d05304ee81725d5bff2739
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0Fj:LTgdZOcuUL3xAx/8b2S7Z05
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation AboutSettingsHandlers.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe -
Executes dropped EXE 2 IoCs
pid Process 5512 AboutSettingsHandlers.exe 1076 AboutSettingsHandlers.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5812-16-0x00000000004B0000-0x0000000000639000-memory.dmp autoit_exe behavioral2/memory/5812-19-0x00000000004B0000-0x0000000000639000-memory.dmp autoit_exe behavioral2/memory/5812-22-0x00000000004B0000-0x0000000000639000-memory.dmp autoit_exe behavioral2/memory/5512-39-0x00000000002D0000-0x0000000000459000-memory.dmp autoit_exe behavioral2/memory/5512-41-0x00000000002D0000-0x0000000000459000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5812 set thread context of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5512 set thread context of 1076 5512 AboutSettingsHandlers.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5264 schtasks.exe 6012 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4692 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5812 wrote to memory of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5812 wrote to memory of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5812 wrote to memory of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5812 wrote to memory of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5812 wrote to memory of 4692 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 92 PID 5812 wrote to memory of 5264 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 96 PID 5812 wrote to memory of 5264 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 96 PID 5812 wrote to memory of 5264 5812 fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe 96 PID 5512 wrote to memory of 1076 5512 AboutSettingsHandlers.exe 100 PID 5512 wrote to memory of 1076 5512 AboutSettingsHandlers.exe 100 PID 5512 wrote to memory of 1076 5512 AboutSettingsHandlers.exe 100 PID 5512 wrote to memory of 1076 5512 AboutSettingsHandlers.exe 100 PID 5512 wrote to memory of 1076 5512 AboutSettingsHandlers.exe 100 PID 5512 wrote to memory of 6012 5512 AboutSettingsHandlers.exe 103 PID 5512 wrote to memory of 6012 5512 AboutSettingsHandlers.exe 103 PID 5512 wrote to memory of 6012 5512 AboutSettingsHandlers.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe"C:\Users\Admin\AppData\Local\Temp\fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe"C:\Users\Admin\AppData\Local\Temp\fb7b6f2bf9f7494994228787e1b75387f75d3e69bcc030435b2dba2f0a12751d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5264
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5512 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:1076
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5bb8e7f664f836d869de5c1c49d118390
SHA1fae8c900238b05893d414307c0619ab9e78b7a9e
SHA25690f2ca56143a13546f69f05db4ca983f79f3dc73e23034c9754485e0b9fa9c02
SHA51228f6aad6c3341b4a7276a7ea8be637ce68f233f9502bb1eb82c8507d58b246e86b907be5f627c5316d551e6dd91dc39c31b9a5f77bbe9669a9d724eda65cecf2
-
Filesize
79B
MD5b924f9b7b8eb53ace58ac2ec4e3132a8
SHA1315a300cf5e4058495e11cb291a5835ec6d6849b
SHA256cd2792393009744b24e98ff20d2e1f9716de785f54ba77433ff7e25fa3ddb457
SHA512a20a54c354a42291df31ea284e85060e789c7b1c6fd3a50008671807b58c7c60832a83f2e33872e15c3dfb919a57b2a3667163057e6a4b33fa391bd52cb42021