Analysis
-
max time kernel
60s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe
Resource
win10v2004-20250314-en
General
-
Target
79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe
-
Size
1.1MB
-
MD5
f02ee994d7fe02a11c3314b135e2eb5e
-
SHA1
067d3c3349b64a5c9b6c6269df8a78624450cc03
-
SHA256
79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289
-
SHA512
d8ca0faa09ed9ce5210b0326df577d8ae2b94a1f135fd272c70b41b6ef14bd1cb0b01aad5e4b33e076e341eed7eda6ccec8e612297d1622f2a30c95b14a3e03b
-
SSDEEP
24576:eaTgKwZ14X27uUL3VM0kd+rkhfMsjgkAj2JE06J5N0Fq:LTgdZOcuUL3xAx/8b2S7Z0I
Malware Config
Extracted
remcos
2.2.2 Pro
chinemerem
remcoss.onmypc.org:3765
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
r-8ET8H0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 1 IoCs
pid Process 2596 AboutSettingsHandlers.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2412-20-0x0000000001220000-0x00000000013A9000-memory.dmp autoit_exe behavioral1/memory/2412-25-0x0000000001220000-0x00000000013A9000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2412 set thread context of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AboutSettingsHandlers.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2112 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2752 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 30 PID 2412 wrote to memory of 2112 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 31 PID 2412 wrote to memory of 2112 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 31 PID 2412 wrote to memory of 2112 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 31 PID 2412 wrote to memory of 2112 2412 79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe 31 PID 2092 wrote to memory of 2596 2092 taskeng.exe 34 PID 2092 wrote to memory of 2596 2092 taskeng.exe 34 PID 2092 wrote to memory of 2596 2092 taskeng.exe 34 PID 2092 wrote to memory of 2596 2092 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe"C:\Users\Admin\AppData\Local\Temp\79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe"C:\Users\Admin\AppData\Local\Temp\79b317bc068d59f1f94221b997f7314480b89cb6f90620b53ba8c29bf8974289.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn SystemSettingsAdminFlows /tr "C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2112
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A823D842-2C21-4341-B09F-92806394C3D7} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exeC:\Users\Admin\AppData\Roaming\UIMgrBroker\AboutSettingsHandlers.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD58f439084b8ca24c9bb6462d4e704d42b
SHA1ba59c902a7e434acc17c1855a9421bf9f6a76ba2
SHA256b30bf01603fc42cec7cf06ce083b47675135e5ea40a11a3843a40d3301111184
SHA51202bad7c3ed68afa701a7d56065a6f367f4c5c8a600688286d83802b8b490bfcc5b618c26a59ffb9325c975bb0d2e5e583f5eaf30b5478555deb0e32898d227fe
-
Filesize
79B
MD57598c9d27e2940d4cb71380c4e6e75a7
SHA113cc22302af9cdf061fa495144d936bdda9363ac
SHA256bf9ac6c902ad8494caa79fc5f4ab81ccdbd43947d765a58ecd5de293690323fd
SHA512758c6828e21672b1f3d3c8213724717c12347cdf23421bfea5016ec3163ff838df197bbe5f72aba90c9d5d5a0bc75dcb7a9487131a2b891c6bb1c08414c941cc