Analysis
-
max time kernel
2s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe
Resource
win10v2004-20250314-en
General
-
Target
481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe
-
Size
372KB
-
MD5
bda6a831048a75f25e8ffa55a9418bf7
-
SHA1
756c3237c1f793766b169129181167c328e697d9
-
SHA256
481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37
-
SHA512
16fbada2e7e678e9ae0d642d359946088a841c98741b031108519bc893b6bcc624d97f81402d663c5c191eaac8b4d097f845a96107475ac8ad03adfc099eb3ca
-
SSDEEP
6144:tIdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiuK:tSqQx+H2i+8LBNbdypazCXYY
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Remcos family
-
Executes dropped EXE 6 IoCs
pid Process 2988 hab.exe 1668 hab.exe 2676 remcos.exe 1736 remcos.exe 2268 hab.exe 1224 hab.exe -
Loads dropped DLL 8 IoCs
pid Process 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2988 hab.exe 1900 cmd.exe 1900 cmd.exe 1736 remcos.exe 1736 remcos.exe 2268 hab.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2412 set thread context of 3064 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 30 PID 2988 set thread context of 1668 2988 hab.exe 32 PID 2676 set thread context of 1736 2676 remcos.exe 37 PID 2268 set thread context of 1224 2268 hab.exe 39 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2988 hab.exe 2988 hab.exe 1668 hab.exe 1668 hab.exe 2676 remcos.exe 2676 remcos.exe 1736 remcos.exe 1736 remcos.exe 2268 hab.exe 2268 hab.exe 1224 hab.exe 1224 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2988 hab.exe 2988 hab.exe 1668 hab.exe 1668 hab.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 2988 hab.exe 1668 hab.exe 2676 remcos.exe 1736 remcos.exe 2268 hab.exe 1224 hab.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3064 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 30 PID 2412 wrote to memory of 3064 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 30 PID 2412 wrote to memory of 3064 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 30 PID 2412 wrote to memory of 3064 2412 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 30 PID 3064 wrote to memory of 2988 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 31 PID 3064 wrote to memory of 2988 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 31 PID 3064 wrote to memory of 2988 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 31 PID 3064 wrote to memory of 2988 3064 481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe 31 PID 2988 wrote to memory of 1668 2988 hab.exe 32 PID 2988 wrote to memory of 1668 2988 hab.exe 32 PID 2988 wrote to memory of 1668 2988 hab.exe 32 PID 2988 wrote to memory of 1668 2988 hab.exe 32 PID 1668 wrote to memory of 2912 1668 hab.exe 33 PID 1668 wrote to memory of 2912 1668 hab.exe 33 PID 1668 wrote to memory of 2912 1668 hab.exe 33 PID 1668 wrote to memory of 2912 1668 hab.exe 33 PID 2912 wrote to memory of 1900 2912 WScript.exe 34 PID 2912 wrote to memory of 1900 2912 WScript.exe 34 PID 2912 wrote to memory of 1900 2912 WScript.exe 34 PID 2912 wrote to memory of 1900 2912 WScript.exe 34 PID 1900 wrote to memory of 2676 1900 cmd.exe 36 PID 1900 wrote to memory of 2676 1900 cmd.exe 36 PID 1900 wrote to memory of 2676 1900 cmd.exe 36 PID 1900 wrote to memory of 2676 1900 cmd.exe 36 PID 2676 wrote to memory of 1736 2676 remcos.exe 37 PID 2676 wrote to memory of 1736 2676 remcos.exe 37 PID 2676 wrote to memory of 1736 2676 remcos.exe 37 PID 2676 wrote to memory of 1736 2676 remcos.exe 37 PID 1736 wrote to memory of 2268 1736 remcos.exe 38 PID 1736 wrote to memory of 2268 1736 remcos.exe 38 PID 1736 wrote to memory of 2268 1736 remcos.exe 38 PID 1736 wrote to memory of 2268 1736 remcos.exe 38 PID 2268 wrote to memory of 1224 2268 hab.exe 39 PID 2268 wrote to memory of 1224 2268 hab.exe 39 PID 2268 wrote to memory of 1224 2268 hab.exe 39 PID 2268 wrote to memory of 1224 2268 hab.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe"C:\Users\Admin\AppData\Local\Temp\481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe"C:\Users\Admin\AppData\Local\Temp\481841aebb41952021b31d784769bf7d534c0a9e82f7c1ca12eed710e9ceba37.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD546f04f1d86c37dc9ec80a83316a6b662
SHA1032fbdaf6d88266da413dc53288f6295f44cd725
SHA2564ac1bfa758b5b71d6f4b2fef14b7afdf6a31cb0c7eafbb1454346e29dc4c0e29
SHA512420b77a7b457d290837d3bbd8b09d277ffbd1578f85f6bee59e78d6393af6bc29ad6973c4ddee40521c24e83153cd7607262793767fbd89d69cb886e6b548824
-
Filesize
536B
MD5b4118bddcc9fe0ae73396b2b1b58c970
SHA123afa06fa78bbcc9c11e8549681fd4956f9d6c45
SHA256e5d5005f7c9fdada426273f14e2ebe328b84f9161e80acc1396dadbe9897e98f
SHA512fdc29fb8fafb990e52487b9ec22140dcbc8c684efa53da41e348584c623fff1a7ce1a9b3deaccdb25867479b393d52d199c8f09cb365e6c84e5980f6d4285b67
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD5e836e54ed55c3f07ef897463fb74f66f
SHA11eb4f46b6608786ac75dc5698f9509b0acb3d709
SHA2565a2f6a9c4c926160e2ce2b45867a653534efbc00bbfba085f8c4439da44554c7
SHA512d75138d2499d6953101a8228f00a00badf3e57ca3bcf2ac2a3f4b54cdcd639e7d383efeea3273f9b4f82f5ea0bf60559dcbc4857c8a4747dac3f1fde7b1c6e45