Analysis
-
max time kernel
4s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
Resource
win10v2004-20250314-en
General
-
Target
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe
-
Size
372KB
-
MD5
566502fdae5980d5ecd941404442db1f
-
SHA1
e75a4e756820c1ed7039dca27f6c5d0e67f9e05d
-
SHA256
e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2
-
SHA512
16d2c37003c2c3ca15004a4ac3232cb1a4698efd6d5974a6238381feec035f919e53a4ce21254d4612e64f15785c583b3e822c441b2c6f411bbe290bdcb1c2fe
-
SSDEEP
6144:t6dgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiee:tQqQx+H2i+8LBNbdypazCXYI
Malware Config
Extracted
remcos
2.4.3 Pro
TINo
185.140.53.140:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-5S9O07
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Remcos family
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation remcos.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation hab.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation hab.exe -
Executes dropped EXE 11 IoCs
pid Process 440 hab.exe 1452 hab.exe 4732 remcos.exe 4648 remcos.exe 5708 hab.exe 5896 hab.exe 876 hab.exe 4780 hab.exe 5368 remcos.exe 5836 hab.exe 2584 remcos.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bru = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\hab.vbs\"" hab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" hab.exe -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ hab.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe File opened for modification C:\Windows\win.ini remcos.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings hab.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings hab.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 440 hab.exe 440 hab.exe 1452 hab.exe 1452 hab.exe 4732 remcos.exe 4732 remcos.exe 5708 hab.exe 5708 hab.exe 4648 remcos.exe 4648 remcos.exe 5896 hab.exe 5896 hab.exe 876 hab.exe 876 hab.exe 5368 remcos.exe 5368 remcos.exe 4780 hab.exe 4780 hab.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 440 hab.exe 440 hab.exe 1452 hab.exe 1452 hab.exe 4732 remcos.exe 4732 remcos.exe 5708 hab.exe 5708 hab.exe 4648 remcos.exe 4648 remcos.exe 5896 hab.exe 5896 hab.exe 876 hab.exe 876 hab.exe 5368 remcos.exe 5368 remcos.exe 4780 hab.exe 4780 hab.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 440 hab.exe 1452 hab.exe 4732 remcos.exe 5708 hab.exe 4648 remcos.exe 5896 hab.exe 876 hab.exe 4780 hab.exe 5368 remcos.exe 5836 hab.exe 2584 remcos.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 5516 wrote to memory of 5448 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 88 PID 5516 wrote to memory of 5448 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 88 PID 5516 wrote to memory of 5448 5516 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 88 PID 5448 wrote to memory of 440 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 90 PID 5448 wrote to memory of 440 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 90 PID 5448 wrote to memory of 440 5448 e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe 90 PID 440 wrote to memory of 1452 440 hab.exe 91 PID 440 wrote to memory of 1452 440 hab.exe 91 PID 440 wrote to memory of 1452 440 hab.exe 91 PID 1100 wrote to memory of 4704 1100 cmd.exe 96 PID 1100 wrote to memory of 4704 1100 cmd.exe 96 PID 6056 wrote to memory of 4732 6056 cmd.exe 97 PID 6056 wrote to memory of 4732 6056 cmd.exe 97 PID 6056 wrote to memory of 4732 6056 cmd.exe 97 PID 1452 wrote to memory of 4156 1452 hab.exe 98 PID 1452 wrote to memory of 4156 1452 hab.exe 98 PID 1452 wrote to memory of 4156 1452 hab.exe 98 PID 4732 wrote to memory of 4648 4732 remcos.exe 99 PID 4732 wrote to memory of 4648 4732 remcos.exe 99 PID 4732 wrote to memory of 4648 4732 remcos.exe 99 PID 4704 wrote to memory of 5708 4704 wscript.exe 100 PID 4704 wrote to memory of 5708 4704 wscript.exe 100 PID 4704 wrote to memory of 5708 4704 wscript.exe 100 PID 5708 wrote to memory of 5896 5708 hab.exe 102 PID 5708 wrote to memory of 5896 5708 hab.exe 102 PID 5708 wrote to memory of 5896 5708 hab.exe 102 PID 4648 wrote to memory of 876 4648 remcos.exe 103 PID 4648 wrote to memory of 876 4648 remcos.exe 103 PID 4648 wrote to memory of 876 4648 remcos.exe 103 PID 876 wrote to memory of 4780 876 hab.exe 171 PID 876 wrote to memory of 4780 876 hab.exe 171 PID 876 wrote to memory of 4780 876 hab.exe 171 PID 5896 wrote to memory of 5336 5896 hab.exe 109 PID 5896 wrote to memory of 5336 5896 hab.exe 109 PID 5896 wrote to memory of 5336 5896 hab.exe 109 PID 1940 wrote to memory of 5368 1940 cmd.exe 110 PID 1940 wrote to memory of 5368 1940 cmd.exe 110 PID 1940 wrote to memory of 5368 1940 cmd.exe 110 PID 3532 wrote to memory of 5328 3532 cmd.exe 167 PID 3532 wrote to memory of 5328 3532 cmd.exe 167 PID 5328 wrote to memory of 5836 5328 wscript.exe 112 PID 5328 wrote to memory of 5836 5328 wscript.exe 112 PID 5328 wrote to memory of 5836 5328 wscript.exe 112 PID 5368 wrote to memory of 2584 5368 remcos.exe 113 PID 5368 wrote to memory of 2584 5368 remcos.exe 113 PID 5368 wrote to memory of 2584 5368 remcos.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5516 -
C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"C:\Users\Admin\AppData\Local\Temp\e74729c3bfe67f672f7fb05617a174abb90ed4c802f53b799c05e7e7cd460ca2.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5448 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5708 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:5336
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:4436
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5328 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5836 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5484
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:4480
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5368 -
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:1824
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:3588
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:960
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1004
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:4332
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:2544
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:1972
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"6⤵PID:4788
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:400
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:4804
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:1744
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5784
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:2216
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:5328
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:2324
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:6056
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:5248
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:5628
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:3940
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"5⤵PID:3580
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:5408
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:5372
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:1004
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:2540
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:1472
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:4900
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4780
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:1184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:4124
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:2688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:532
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵PID:2192
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:1928
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:4560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:3240
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:5720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"1⤵PID:3484
-
C:\Windows\system32\wscript.exewscript "C:\Users\Admin\AppData\Local\Temp\hab.vbs"2⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵PID:5036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"1⤵PID:1116
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe2⤵PID:4776
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe3⤵PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5b1050cee17440c0137dbfbf3fd556c8f
SHA117a3059c62acad5bfa4a66f8b9eb2f8ee0b4d35b
SHA256861194e109a2ba9dfd5573fef3f1cd75a04ccdcd500563693836ca475e3b0a7d
SHA512fdf4a4964b971a019617107899b679b5bb9a0523f02e1f878c7aca83a34835165158e3092bcd380a0f1b47695a7c46c6b7ddeffa74be59dced09301d94a2e813
-
Filesize
92B
MD5924c10de3467040c668a0c01b7b3f6b7
SHA124e7f554808c9047bd74448023727aeffafd5ba9
SHA2560045a1cae6a54111951d5f03d8843e250001405742937683744bec9afb4ff0f4
SHA512feaa18c4c36c54e3bfba5a8c4b57f7088ad05887b91f1a6384af5ea2c54cb39ebd7930b4e6e23ddc18938ff0f4c041083dbe03362c8811c2d0274002459578f0
-
Filesize
536B
MD5b4118bddcc9fe0ae73396b2b1b58c970
SHA123afa06fa78bbcc9c11e8549681fd4956f9d6c45
SHA256e5d5005f7c9fdada426273f14e2ebe328b84f9161e80acc1396dadbe9897e98f
SHA512fdc29fb8fafb990e52487b9ec22140dcbc8c684efa53da41e348584c623fff1a7ce1a9b3deaccdb25867479b393d52d199c8f09cb365e6c84e5980f6d4285b67
-
Filesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06