Analysis
-
max time kernel
57s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe
Resource
win10v2004-20250314-en
General
-
Target
798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe
-
Size
1.1MB
-
MD5
bb7ddf35ddc719934858d0f0fb8d754c
-
SHA1
d9e8e45c53c1225e76181a27c396031a6b51311d
-
SHA256
798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34
-
SHA512
d5de4e075f06acc67ff985814b2b2397f418e674c40e7da26e46696abebc0c6e21e59c498d388fba8490efa08f8a28c8b6c5df8c0bea34aab7ed565d33599c1d
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0FG:LTgdZOcuUL3xAx/8b2S7Z0M
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2776 AboutSettingsHandlers.exe 2624 AboutSettingsHandlers.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2036-22-0x0000000000B00000-0x0000000000C89000-memory.dmp autoit_exe behavioral1/memory/2036-27-0x0000000000B00000-0x0000000000C89000-memory.dmp autoit_exe behavioral1/memory/2776-30-0x0000000000320000-0x00000000004A9000-memory.dmp autoit_exe behavioral1/memory/2776-44-0x0000000000320000-0x00000000004A9000-memory.dmp autoit_exe behavioral1/memory/2776-47-0x0000000000320000-0x00000000004A9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2036 set thread context of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2776 set thread context of 2624 2776 AboutSettingsHandlers.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe 2268 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 3020 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 30 PID 2036 wrote to memory of 2268 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 32 PID 2036 wrote to memory of 2268 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 32 PID 2036 wrote to memory of 2268 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 32 PID 2036 wrote to memory of 2268 2036 798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe 32 PID 2628 wrote to memory of 2776 2628 taskeng.exe 35 PID 2628 wrote to memory of 2776 2628 taskeng.exe 35 PID 2628 wrote to memory of 2776 2628 taskeng.exe 35 PID 2628 wrote to memory of 2776 2628 taskeng.exe 35 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2624 2776 AboutSettingsHandlers.exe 36 PID 2776 wrote to memory of 2708 2776 AboutSettingsHandlers.exe 37 PID 2776 wrote to memory of 2708 2776 AboutSettingsHandlers.exe 37 PID 2776 wrote to memory of 2708 2776 AboutSettingsHandlers.exe 37 PID 2776 wrote to memory of 2708 2776 AboutSettingsHandlers.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe"C:\Users\Admin\AppData\Local\Temp\798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe"C:\Users\Admin\AppData\Local\Temp\798c985ff1a153d61fbfa40754337773a788811e3ddba8fdcaeb904ff2992f34.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2268
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {559DC784-A92E-4549-AAE4-76F1EB1975C4} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe"3⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b719785d528317c2d5be158f299d915a
SHA1a44c73eca3d855d2a4951495e7547160f4c3fe90
SHA256b7783ba56c7ebe74bbc4f6ea61361e365819457991b024712385f2f3fdec1ea7
SHA512d61cbd56dea75a480ec324ff62ad521ee6af8b06daa39e50cf68b85556efa69ccedcd84c76ee13b259b9a5425c6d032c5b1e5133ad512473f3ca4d1714ddb974
-
Filesize
79B
MD53b5417385c9939a0bc4d103190c530fe
SHA188ec0a8fb9df01787a4c34b08e323628527d93cc
SHA2564a4cd59205a704e765de16f3786a1f5feaac85d8158a33b10627f541af617b6e
SHA5126c9545e1fafc406a4bcf2600551f76bf062e6a510a62245407d17547d94664c7885c006e2bede58f15ceb4cd23f02c9b1591f8c3ae683d62033703afbbc9bffe