Analysis
-
max time kernel
2s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe
Resource
win10v2004-20250314-en
General
-
Target
ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe
-
Size
372KB
-
MD5
9ddc44a5c178dd4373d2783205f5bb7e
-
SHA1
fdc28a7ba32079ac97117794960c3e73a8e1bc80
-
SHA256
ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab
-
SHA512
1708cc48e42d6d1f6abbdb8bc904aa4df35d1968116806f2e375ba0e77a7e9c5cf0709a4c5b897a5bd0ecd3bf781720edd6323926e67198858349862bcad6bab
-
SSDEEP
6144:t8dgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiC+:t2qQx+H2i+8LBNbdypazCXY0
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Remcos family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation hab.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation remcos.exe -
Executes dropped EXE 6 IoCs
pid Process 5188 hab.exe 3040 hab.exe 4804 remcos.exe 1040 hab.exe 2952 remcos.exe 4844 hab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe File opened for modification C:\Windows\win.ini ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings hab.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5188 hab.exe 5188 hab.exe 3040 hab.exe 3040 hab.exe 4804 remcos.exe 4804 remcos.exe 1040 hab.exe 1040 hab.exe 2952 remcos.exe 2952 remcos.exe 4844 hab.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5188 hab.exe 5188 hab.exe 3040 hab.exe 3040 hab.exe 4804 remcos.exe 4804 remcos.exe 1040 hab.exe 1040 hab.exe 2952 remcos.exe 2952 remcos.exe 4844 hab.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 5188 hab.exe 3040 hab.exe 4804 remcos.exe 1040 hab.exe 2952 remcos.exe 4844 hab.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 5284 wrote to memory of 5456 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 88 PID 5284 wrote to memory of 5456 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 88 PID 5284 wrote to memory of 5456 5284 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 88 PID 5456 wrote to memory of 5188 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 89 PID 5456 wrote to memory of 5188 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 89 PID 5456 wrote to memory of 5188 5456 ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe 89 PID 5188 wrote to memory of 3040 5188 hab.exe 90 PID 5188 wrote to memory of 3040 5188 hab.exe 90 PID 5188 wrote to memory of 3040 5188 hab.exe 90 PID 4968 wrote to memory of 4656 4968 cmd.exe 95 PID 4968 wrote to memory of 4656 4968 cmd.exe 95 PID 4548 wrote to memory of 4804 4548 cmd.exe 96 PID 4548 wrote to memory of 4804 4548 cmd.exe 96 PID 4548 wrote to memory of 4804 4548 cmd.exe 96 PID 3040 wrote to memory of 3332 3040 hab.exe 97 PID 3040 wrote to memory of 3332 3040 hab.exe 97 PID 3040 wrote to memory of 3332 3040 hab.exe 97 PID 4656 wrote to memory of 1040 4656 wscript.exe 98 PID 4656 wrote to memory of 1040 4656 wscript.exe 98 PID 4656 wrote to memory of 1040 4656 wscript.exe 98 PID 4804 wrote to memory of 2952 4804 remcos.exe 100 PID 4804 wrote to memory of 2952 4804 remcos.exe 100 PID 4804 wrote to memory of 2952 4804 remcos.exe 100 PID 1040 wrote to memory of 4844 1040 hab.exe 167 PID 1040 wrote to memory of 4844 1040 hab.exe 167 PID 1040 wrote to memory of 4844 1040 hab.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe"C:\Users\Admin\AppData\Local\Temp\ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe"C:\Users\Admin\AppData\Local\Temp\ed85b2c5087e8b1b36ce0ae7c3c7532ce415fe626069774af7007b40443df0ab.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4844 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:6048
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:4512
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:3476
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:3360
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1168
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:5256
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5184
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:3152
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:3928
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:2712
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5748
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:6008
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5324
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5760
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:1552
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:4092
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4476
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:5344
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:2512
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:1496
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5956
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:5520
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:5792
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:2172
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:4164
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5508
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5468
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:4640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:5784
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4844
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:2536
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4900
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:5728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:4876
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1940
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:5652
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:2260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:544
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:3924
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:2732
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:5996
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:4996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:6052
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:3228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:2212
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5000
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5b749861c61359bfb05276610b11a95a8
SHA1e7fbc55f75c67cdfc1b650810abd9c04ef830f88
SHA2568d6a17ea27483139cd8bb69361f980d8368c8ba7cc075542ca299d0ee13ad44a
SHA512eb63827587c7b691a619108700ceebd7fde7f4e47bbd1742e565e0c1bf8bb68f2d1e6066adfe8c2aa013fec8e3863a9444144b60328302f6bdd741abf87f0e3f
-
Filesize
92B
MD5924c10de3467040c668a0c01b7b3f6b7
SHA124e7f554808c9047bd74448023727aeffafd5ba9
SHA2560045a1cae6a54111951d5f03d8843e250001405742937683744bec9afb4ff0f4
SHA512feaa18c4c36c54e3bfba5a8c4b57f7088ad05887b91f1a6384af5ea2c54cb39ebd7930b4e6e23ddc18938ff0f4c041083dbe03362c8811c2d0274002459578f0
-
Filesize
536B
MD5b4118bddcc9fe0ae73396b2b1b58c970
SHA123afa06fa78bbcc9c11e8549681fd4956f9d6c45
SHA256e5d5005f7c9fdada426273f14e2ebe328b84f9161e80acc1396dadbe9897e98f
SHA512fdc29fb8fafb990e52487b9ec22140dcbc8c684efa53da41e348584c623fff1a7ce1a9b3deaccdb25867479b393d52d199c8f09cb365e6c84e5980f6d4285b67
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06