Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe
Resource
win10v2004-20250314-en
General
-
Target
79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe
-
Size
372KB
-
MD5
11710b925ff1d5ecf510f0b18edcf213
-
SHA1
73e543fe16aa27095b711e8b6fce0b2647ec83f9
-
SHA256
79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c
-
SHA512
116483b771849049db5879e074365c0680f4377a0a8802a27ac762b616e8d9d8c6127aaafe2fe0758e14ce4f9175a85c3f2b0febcc23f22a5bceffd3833da802
-
SSDEEP
6144:tLdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiyq:tBqQx+H2i+8LBNbdypazCXY8
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2076 hab.exe 852 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2076 hab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2868 set thread context of 2080 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 28 PID 2076 set thread context of 852 2076 hab.exe 30 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2076 hab.exe 2076 hab.exe 852 hab.exe 852 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2076 hab.exe 2076 hab.exe 852 hab.exe 852 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 2076 hab.exe 852 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2080 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 28 PID 2868 wrote to memory of 2080 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 28 PID 2868 wrote to memory of 2080 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 28 PID 2868 wrote to memory of 2080 2868 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 28 PID 2080 wrote to memory of 2076 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 29 PID 2080 wrote to memory of 2076 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 29 PID 2080 wrote to memory of 2076 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 29 PID 2080 wrote to memory of 2076 2080 79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe 29 PID 2076 wrote to memory of 852 2076 hab.exe 30 PID 2076 wrote to memory of 852 2076 hab.exe 30 PID 2076 wrote to memory of 852 2076 hab.exe 30 PID 2076 wrote to memory of 852 2076 hab.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe"C:\Users\Admin\AppData\Local\Temp\79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe"C:\Users\Admin\AppData\Local\Temp\79fdf0e96e03cce9d7c56e3316dd7b8d5722f3d371f7120598f922039ae59b2c.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD564030da8412922776f51f820b2cd9d8f
SHA1cf45e7ad5961939c17da1371e473d5f72e62e53b
SHA256e7d2ba76eb656b56a26b4cd17caaf3e2c583a4b885139af475906d2e9e853e0a
SHA5120b60fddb76021bfb21e3fd566a72f8fc4b0555d79f4ca0367572c56cfaa4874845d55359efdf65757143758cbeb36502792a232bb9b689e494220589d40e0ed4