Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:06
Behavioral task
behavioral1
Sample
8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe
Resource
win10v2004-20250314-en
General
-
Target
8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe
-
Size
2.0MB
-
MD5
0b23b73c4a523c12688053a9577b9259
-
SHA1
eef7d5c6d2a5dbeca8bdb53395dc6809e82f1386
-
SHA256
8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028
-
SHA512
5033eee21e0f7e2d410ec83b2b18bdd407aa38d7028b657887fb8a33419c29070ad1ec839f025b93f22d06529fd78fb1b48033f6463f6d6925aa233e170c3b36
-
SSDEEP
24576:x0Zp+ViehBWY0ZXn5+uWaPeKF0tetZtWvcybaaj+LMd9WQ9YnDCJcTt+h7+:niIB90ZXn0uWIs+L2kXZ+h7+
Malware Config
Extracted
remcos
RemoteHost
80.85.154.131:1122
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
bag.exe
-
copy_folder
bag
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Bag loger
-
mouse_option
false
-
mutex
Rmc-CE8V5B
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe -
Executes dropped EXE 5 IoCs
pid Process 1892 bag.exe 4644 bag.exe 3228 bag.exe 5276 bag.exe 5264 bag.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-CE8V5B = "\"C:\\ProgramData\\bag\\bag.exe\"" 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-CE8V5B = "\"C:\\ProgramData\\bag\\bag.exe\"" 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-CE8V5B = "\"C:\\ProgramData\\bag\\bag.exe\"" bag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-CE8V5B = "\"C:\\ProgramData\\bag\\bag.exe\"" bag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bag.exe -
Suspicious behavior: MapViewOfSection 33 IoCs
pid Process 2440 dllhost.exe 2440 dllhost.exe 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 3960 dllhost.exe 3960 dllhost.exe 440 dllhost.exe 440 dllhost.exe 1892 bag.exe 1892 bag.exe 1892 bag.exe 4644 bag.exe 4644 bag.exe 4644 bag.exe 7232 dllhost.exe 7232 dllhost.exe 3228 bag.exe 3228 bag.exe 3228 bag.exe 3228 bag.exe 3228 bag.exe 7816 dllhost.exe 7816 dllhost.exe 7800 dllhost.exe 7800 dllhost.exe 5264 bag.exe 5264 bag.exe 5276 bag.exe 5276 bag.exe 5276 bag.exe 5264 bag.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4644 bag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 208 wrote to memory of 2440 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 88 PID 3008 wrote to memory of 1892 3008 cmd.exe 94 PID 3008 wrote to memory of 1892 3008 cmd.exe 94 PID 3008 wrote to memory of 1892 3008 cmd.exe 94 PID 1624 wrote to memory of 4644 1624 cmd.exe 95 PID 1624 wrote to memory of 4644 1624 cmd.exe 95 PID 1624 wrote to memory of 4644 1624 cmd.exe 95 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 208 wrote to memory of 3228 208 8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe 96 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 4644 wrote to memory of 440 4644 bag.exe 97 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 1892 wrote to memory of 3960 1892 bag.exe 98 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 3228 wrote to memory of 7232 3228 bag.exe 99 PID 7288 wrote to memory of 5276 7288 cmd.exe 104 PID 7288 wrote to memory of 5276 7288 cmd.exe 104 PID 7288 wrote to memory of 5276 7288 cmd.exe 104 PID 7296 wrote to memory of 5264 7296 cmd.exe 105 PID 7296 wrote to memory of 5264 7296 cmd.exe 105 PID 7296 wrote to memory of 5264 7296 cmd.exe 105 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5264 wrote to memory of 7816 5264 bag.exe 106 PID 5276 wrote to memory of 7800 5276 bag.exe 107 PID 5276 wrote to memory of 7800 5276 bag.exe 107 PID 5276 wrote to memory of 7800 5276 bag.exe 107 PID 5276 wrote to memory of 7800 5276 bag.exe 107 PID 5276 wrote to memory of 7800 5276 bag.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe"C:\Users\Admin\AppData\Local\Temp\8c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2440
-
-
C:\ProgramData\bag\bag.exe"C:\ProgramData\bag\bag.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\bag\bag.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\ProgramData\bag\bag.exeC:\ProgramData\bag\bag.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\bag\bag.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\ProgramData\bag\bag.exeC:\ProgramData\bag\bag.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\bag\bag.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:7288 -
C:\ProgramData\bag\bag.exeC:\ProgramData\bag\bag.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5276 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\bag\bag.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:7296 -
C:\ProgramData\bag\bag.exeC:\ProgramData\bag\bag.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5f241ebd264c954e22d185e6d23e77632
SHA15a9165e14e4a8678c0149dada4b5d62bd5148b34
SHA256d8b1900c8452d0d4c4f72d2fad1a19586ec71e056b3b9eac092e7432bcb62150
SHA51230d455cac315eba8a187148df4a91cbf333edc313b059aae42f68791327ac4e7ed4b3d10ffff1a421b70939e48614a251f0139ff56cc9f3d75dd58045ce9bc11
-
Filesize
2.0MB
MD50b23b73c4a523c12688053a9577b9259
SHA1eef7d5c6d2a5dbeca8bdb53395dc6809e82f1386
SHA2568c9ccb64d62d5489eb7c3c8febf700292a696f69f4ee93bb1ad607531a93c028
SHA5125033eee21e0f7e2d410ec83b2b18bdd407aa38d7028b657887fb8a33419c29070ad1ec839f025b93f22d06529fd78fb1b48033f6463f6d6925aa233e170c3b36