Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
Resource
win10v2004-20250314-en
General
-
Target
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe
-
Size
1.1MB
-
MD5
7b8bf7f2c6e9b98839bbdafe0690a353
-
SHA1
e9f8dc02084674dd9f4d5ebb22f5f3ee5c040d04
-
SHA256
d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308
-
SHA512
b5cad596eae2e12058f805e021adf15eab04377f811fa06ce7b0ee87a5594f22fcf97b3be1003615ef98770bdc4e471e54b33b7c8e5bcd99d206cac02d0e56b1
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0F6:LTgdZOcuUL3xAx/8b2S7Z0A
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation AboutSettingsHandlers.exe -
Executes dropped EXE 4 IoCs
pid Process 4916 AboutSettingsHandlers.exe 448 AboutSettingsHandlers.exe 4040 AboutSettingsHandlers.exe 4744 AboutSettingsHandlers.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1708-16-0x0000000000BF0000-0x0000000000D79000-memory.dmp autoit_exe behavioral2/memory/1708-19-0x0000000000BF0000-0x0000000000D79000-memory.dmp autoit_exe behavioral2/memory/1708-22-0x0000000000BF0000-0x0000000000D79000-memory.dmp autoit_exe behavioral2/memory/4916-43-0x0000000000640000-0x00000000007C9000-memory.dmp autoit_exe behavioral2/memory/4916-45-0x0000000000640000-0x00000000007C9000-memory.dmp autoit_exe behavioral2/memory/4040-60-0x0000000000640000-0x00000000007C9000-memory.dmp autoit_exe behavioral2/memory/4040-62-0x0000000000640000-0x00000000007C9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1708 set thread context of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 4916 set thread context of 448 4916 AboutSettingsHandlers.exe 111 PID 4040 set thread context of 4744 4040 AboutSettingsHandlers.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4332 schtasks.exe 3052 schtasks.exe 1524 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 436 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1708 wrote to memory of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 1708 wrote to memory of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 1708 wrote to memory of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 1708 wrote to memory of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 1708 wrote to memory of 436 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 95 PID 1708 wrote to memory of 4332 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 99 PID 1708 wrote to memory of 4332 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 99 PID 1708 wrote to memory of 4332 1708 d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe 99 PID 4916 wrote to memory of 448 4916 AboutSettingsHandlers.exe 111 PID 4916 wrote to memory of 448 4916 AboutSettingsHandlers.exe 111 PID 4916 wrote to memory of 448 4916 AboutSettingsHandlers.exe 111 PID 4916 wrote to memory of 448 4916 AboutSettingsHandlers.exe 111 PID 4916 wrote to memory of 448 4916 AboutSettingsHandlers.exe 111 PID 4916 wrote to memory of 3052 4916 AboutSettingsHandlers.exe 112 PID 4916 wrote to memory of 3052 4916 AboutSettingsHandlers.exe 112 PID 4916 wrote to memory of 3052 4916 AboutSettingsHandlers.exe 112 PID 4040 wrote to memory of 4744 4040 AboutSettingsHandlers.exe 115 PID 4040 wrote to memory of 4744 4040 AboutSettingsHandlers.exe 115 PID 4040 wrote to memory of 4744 4040 AboutSettingsHandlers.exe 115 PID 4040 wrote to memory of 4744 4040 AboutSettingsHandlers.exe 115 PID 4040 wrote to memory of 4744 4040 AboutSettingsHandlers.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"C:\Users\Admin\AppData\Local\Temp\d25efc17afb97e52ac1270b93b161fb427dde56e3e4eafbda37ce5c2356e9308.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3052
-
-
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"2⤵
- Executes dropped EXE
PID:4744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5662600242b97ccef55b70d909eb0ee19
SHA1b69eb1c2f943803ad55acde59d2be76a009df551
SHA25605838e3d722e3de417588c623d6db2ebad07db2d87fe8996afdb0ac9844c927b
SHA51236eaca0b5a7bb05151511a02e6724162d2cb005b43ae070ce651326efbee723756202ecf19e6518224d51c9d81c8103553b3ba5cdd7ef0da6c1a9416ccdab10c
-
Filesize
79B
MD5f2a464a0b3fb315b3b16b77624cc6f37
SHA16ce61d8a1b387ad6f3ff1bc64431801592e8c7c6
SHA2566193eacb0d12bd227f4272910626a6507271213f664091d47c9a9d0c6ce22fde
SHA51209805d6adb4635ebebd9ea793ac833cb49efc3e78b32e1ab3d54af5a2888e97b267b0899a2ea4cd86d1691d87e0df8b48822588d2a68e8b768873ad9f46c7348