Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
Resource
win10v2004-20250314-en
General
-
Target
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
-
Size
1.1MB
-
MD5
7b8bf7f2c6e9b98839bbdafe0690a353
-
SHA1
e9f8dc02084674dd9f4d5ebb22f5f3ee5c040d04
-
SHA256
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308
-
SHA512
b5cad596eae2e12058f805e021adf15eab04377f811fa06ce7b0ee87a5594f22fcf97b3be1003615ef98770bdc4e471e54b33b7c8e5bcd99d206cac02d0e56b1
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0F6:LTgdZOcuUL3xAx/8b2S7Z0A
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 4 IoCs
pid Process 2812 AboutSettingsHandlers.exe 2880 AboutSettingsHandlers.exe 3020 AboutSettingsHandlers.exe 2276 AboutSettingsHandlers.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1736-22-0x0000000000390000-0x0000000000519000-memory.dmp autoit_exe behavioral1/memory/1736-25-0x0000000000390000-0x0000000000519000-memory.dmp autoit_exe behavioral1/memory/1736-28-0x0000000000390000-0x0000000000519000-memory.dmp autoit_exe behavioral1/memory/2812-48-0x00000000003B0000-0x0000000000539000-memory.dmp autoit_exe behavioral1/memory/2812-50-0x00000000003B0000-0x0000000000539000-memory.dmp autoit_exe behavioral1/memory/2812-52-0x00000000003B0000-0x0000000000539000-memory.dmp autoit_exe behavioral1/memory/3020-71-0x0000000000350000-0x00000000004D9000-memory.dmp autoit_exe behavioral1/memory/3020-73-0x0000000000350000-0x00000000004D9000-memory.dmp autoit_exe behavioral1/memory/3020-74-0x0000000000350000-0x00000000004D9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1736 set thread context of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 2812 set thread context of 2880 2812 AboutSettingsHandlers.exe 35 PID 3020 set thread context of 2276 3020 AboutSettingsHandlers.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2360 schtasks.exe 980 schtasks.exe 2932 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2596 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 30 PID 1736 wrote to memory of 2932 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 31 PID 1736 wrote to memory of 2932 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 31 PID 1736 wrote to memory of 2932 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 31 PID 1736 wrote to memory of 2932 1736 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 31 PID 2944 wrote to memory of 2812 2944 taskeng.exe 34 PID 2944 wrote to memory of 2812 2944 taskeng.exe 34 PID 2944 wrote to memory of 2812 2944 taskeng.exe 34 PID 2944 wrote to memory of 2812 2944 taskeng.exe 34 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2880 2812 AboutSettingsHandlers.exe 35 PID 2812 wrote to memory of 2360 2812 AboutSettingsHandlers.exe 37 PID 2812 wrote to memory of 2360 2812 AboutSettingsHandlers.exe 37 PID 2812 wrote to memory of 2360 2812 AboutSettingsHandlers.exe 37 PID 2812 wrote to memory of 2360 2812 AboutSettingsHandlers.exe 37 PID 2944 wrote to memory of 3020 2944 taskeng.exe 39 PID 2944 wrote to memory of 3020 2944 taskeng.exe 39 PID 2944 wrote to memory of 3020 2944 taskeng.exe 39 PID 2944 wrote to memory of 3020 2944 taskeng.exe 39 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 2276 3020 AboutSettingsHandlers.exe 40 PID 3020 wrote to memory of 980 3020 AboutSettingsHandlers.exe 41 PID 3020 wrote to memory of 980 3020 AboutSettingsHandlers.exe 41 PID 3020 wrote to memory of 980 3020 AboutSettingsHandlers.exe 41 PID 3020 wrote to memory of 980 3020 AboutSettingsHandlers.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {106036DC-2C28-4D63-82CC-55866189B456} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:2880
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:2276
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52048838466c364f45add51fee71512ca
SHA160171cd63b75e0d14e74d925a390a1400f8310e1
SHA256c4d8ab355edecf8838a57f2d973d9158aacb070c017d83ef103addfa73b46754
SHA5120129f830da47c2cc8e8aa0bbd8ff91d3d60b2e10fe6bde987dea1f8d2adcb1ad5cf1df11c1641f9784b47b43d2abf86612ee06c1c05497b1d9d6680cdf7ec329
-
Filesize
79B
MD5e85cacb49f21faebbb5b9ada5c5f5489
SHA1e0447ef011e4851e85a8fc8d4eb2cae5e826512f
SHA256c776023c155c0784f2af341c3e197a294859c01071ec30f0fc4ea38b97a56ac5
SHA51251f973647ba32af8b83ed528eccd2ba7fb10b7ad9de8eb65150014f7c06dfab30b1ad1bc6b550d225519d1bf0d12e12df554f1e61a74071eac6293d091209f5e