Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
Resource
win10v2004-20250314-en
General
-
Target
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
-
Size
372KB
-
MD5
566502fdae5980d5ecd941404442db1f
-
SHA1
e75a4e756820c1ed7039dca27f6c5d0e67f9e05d
-
SHA256
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2
-
SHA512
16d2c37003c2c3ca15004a4ac3232cb1a4698efd6d5974a6238381feec035f919e53a4ce21254d4612e64f15785c583b3e822c441b2c6f411bbe290bdcb1c2fe
-
SSDEEP
6144:t6dgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiee:tQqQx+H2i+8LBNbdypazCXYI
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2648 hab.exe 2864 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2648 hab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2748 set thread context of 3012 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 30 PID 2648 set thread context of 2864 2648 hab.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe File opened for modification C:\Windows\win.ini e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2648 hab.exe 2648 hab.exe 2864 hab.exe 2864 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2648 hab.exe 2648 hab.exe 2864 hab.exe 2864 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 2648 hab.exe 2864 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3012 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 30 PID 2748 wrote to memory of 3012 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 30 PID 2748 wrote to memory of 3012 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 30 PID 2748 wrote to memory of 3012 2748 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 30 PID 3012 wrote to memory of 2648 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 31 PID 3012 wrote to memory of 2648 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 31 PID 3012 wrote to memory of 2648 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 31 PID 3012 wrote to memory of 2648 3012 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 31 PID 2648 wrote to memory of 2864 2648 hab.exe 32 PID 2648 wrote to memory of 2864 2648 hab.exe 32 PID 2648 wrote to memory of 2864 2648 hab.exe 32 PID 2648 wrote to memory of 2864 2648 hab.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD5b1050cee17440c0137dbfbf3fd556c8f
SHA117a3059c62acad5bfa4a66f8b9eb2f8ee0b4d35b
SHA256861194e109a2ba9dfd5573fef3f1cd75a04ccdcd500563693836ca475e3b0a7d
SHA512fdf4a4964b971a019617107899b679b5bb9a0523f02e1f878c7aca83a34835165158e3092bcd380a0f1b47695a7c46c6b7ddeffa74be59dced09301d94a2e813