Analysis
-
max time kernel
23s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
PO_115142pdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
PO_115142pdf.exe
-
Size
917KB
-
MD5
d09c95b9fecad316b637740b3f869318
-
SHA1
6e04663afafacc5dd89425a771a180eebe689349
-
SHA256
81aba97e6129afeb03193f6cd4f57faa50997c40ef62ecf2b293ea54785b698e
-
SHA512
237f8cb5d5f5221370fd1677a8eafb7f6fad7878887a6bbefe7657ef4a5db3f52a2a10d5ba2931087473376b719a97f890f372786ae50f57f14ece1909b8bbf6
-
SSDEEP
12288:wYimDBA8NFYJLxcfB3sfrF0waNaYIxe6voaTspllnur5V90f:wYimDBXWJLSZ+eNBSe6BTwldG5V90f
Malware Config
Extracted
remcos
RemoteHost
193.222.96.222:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QZQ9S9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/3964-213-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/996-223-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1652-220-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/3964-214-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1652-220-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/3964-213-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral1/memory/3964-214-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation PO_115142pdf.exe -
Executes dropped EXE 3 IoCs
pid Process 4128 remcos.exe 3704 remcos.exe 428 remcos.exe -
Loads dropped DLL 4 IoCs
pid Process 3000 PO_115142pdf.exe 3000 PO_115142pdf.exe 4128 remcos.exe 4128 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-QZQ9S9 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" PO_115142pdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-QZQ9S9 = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" PO_115142pdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 30 drive.google.com 31 drive.google.com 54 drive.google.com 66 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4836 PO_115142pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3000 PO_115142pdf.exe 4836 PO_115142pdf.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\remediers\acrogamous.ini remcos.exe File opened for modification C:\Windows\resources\remediers\acrogamous.ini PO_115142pdf.exe File opened for modification C:\Windows\resources\remediers\acrogamous.ini remcos.exe File opened for modification C:\Windows\resources\remediers\acrogamous.ini remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO_115142pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO_115142pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3000 PO_115142pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3000 wrote to memory of 4836 3000 PO_115142pdf.exe 94 PID 3000 wrote to memory of 4836 3000 PO_115142pdf.exe 94 PID 3000 wrote to memory of 4836 3000 PO_115142pdf.exe 94 PID 3000 wrote to memory of 4836 3000 PO_115142pdf.exe 94 PID 4836 wrote to memory of 4128 4836 PO_115142pdf.exe 101 PID 4836 wrote to memory of 4128 4836 PO_115142pdf.exe 101 PID 4836 wrote to memory of 4128 4836 PO_115142pdf.exe 101 PID 1492 wrote to memory of 3704 1492 cmd.exe 102 PID 1492 wrote to memory of 3704 1492 cmd.exe 102 PID 1492 wrote to memory of 3704 1492 cmd.exe 102 PID 532 wrote to memory of 428 532 cmd.exe 103 PID 532 wrote to memory of 428 532 cmd.exe 103 PID 532 wrote to memory of 428 532 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO_115142pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO_115142pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\PO_115142pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO_115142pdf.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4128 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵PID:3028
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\xmafcbzxtdnxv"5⤵PID:3964
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\hgnxdujzplfcfpng"5⤵PID:1652
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ritqemutdtxpivbkrlxz"5⤵PID:3444
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ritqemutdtxpivbkrlxz"5⤵PID:996
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:8
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:5060
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:4264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:4360
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD5d09c95b9fecad316b637740b3f869318
SHA16e04663afafacc5dd89425a771a180eebe689349
SHA25681aba97e6129afeb03193f6cd4f57faa50997c40ef62ecf2b293ea54785b698e
SHA512237f8cb5d5f5221370fd1677a8eafb7f6fad7878887a6bbefe7657ef4a5db3f52a2a10d5ba2931087473376b719a97f890f372786ae50f57f14ece1909b8bbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD53f9cf23ccdbd9896fcc0cb03ecc689ca
SHA1106d62e0b1ce7dfbab6724ffb9a8b930ebd806b6
SHA256718c029ee51e5e9f86b5c1941086b1bf7a3eb8348faa803e9ab30039176d7ff0
SHA51249aba75557a6239fec71b2ae988baf74f25d4ce6b50462eb6018cf9ddac1acf336de143b67a6bf21dbf50da576c5e00793853b1d897adab02e917809530cd1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C
Filesize472B
MD5aef6287d4bde6714ce1bfbb54e9a6713
SHA19c01405e5c8236c5bc515717b3222db42575d615
SHA256a619c379c9c20747dc3f31c6c37fc09021fb70e6f1f9cb4a6b29dc9fb3176593
SHA512b16f6a744eff62a1bd95ab7cb90e8ff432d5ef5549d0e993183d8de3428cea9d79e6e1ecaa8d542e5c5d213ad385b8128b2f633c13a69c851ab0ee6a7c223e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069
Filesize471B
MD59c3700b7859ff4087b8fbbbd2fe79f39
SHA18f1ee0630c80b433d119a5e6dbf7533b2af88954
SHA2568da55df16b66ba40161a2e3cd517c2be6dfecf0a1a6d94fb6bc67dd38e0e2539
SHA512291187c63f8a3ae379717deaf9bf702cc382ddf27fa893ed92f5295fe314a2322b721cc1c6f1ac061fdbee4830d65b1da69f2155b38054edf37e94ccdbbb77f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD558d81318c983002f5b56db971ed07790
SHA1641cd29cad00fd6f97c9ee4a78c1c6255f5a8e1e
SHA25629885d81b2fe606ea44ed7a110a93614c4daf704e04df65c95e23641f684321e
SHA51291e5772dec266288354d57e99e1465f95ce63907b54c533776cb939588f43426bec917bfc869bd2bd5dacc6d8d6dbe03ec0734c18c81794950ea18b169e333cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_83F29ED1D5F129EB605BF640EBE52C8C
Filesize402B
MD59fc382ba2ab27c2ee4902b76fca8d9dc
SHA1ee9b3faa428630ba52de94c2f5b689f58602db8c
SHA25610d5628db3526b9ec4e6838ca53f40afa0fbf8961f94e39c205cbc2c30eb89a4
SHA5128d7bfeba0814ad91ebca5d6c494ce2a4fb24bbf6242f292c719b1a524a326bbb0102494cde8cfa05d75184e492f308169aa8ff0a02d1140773b9c23121ac7a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_14926B8298A57E2D3C526CDC93311069
Filesize402B
MD5cbe87008969b856bc2e5a53c850617a5
SHA1c612b518b96a69450c9b007bcb29c21c94234d92
SHA256645bffe0d8d8c053735c9be4be12b45ba8a1a574983c4136156d58c6a8fa93c9
SHA512635afabf956deecbca786c26c3da8308076303356ae4090d809b6397ca1a0553e964430bface121006bcd621e53ba8b842da729db899189deffbe157a5acf2d1
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
1.8MB
MD5280c940547895f82278ba8b491e0ca3b
SHA1de09b3999636cca42be716952d97547e72bd5890
SHA2561d7a813a18eec9478655b63429c790814f78cd64cce71752aea3362f0a55a531
SHA512d28c4de5d7c7a90973f23aa2e1e828a329909f8eb06172b5a71360716f4175344ee0af9c544ec1813290eff0cf1e8e298aaf29b91121edd667b49090b02451af
-
Filesize
348KB
MD54b8edc6964355bb0da2db041a8c0eb62
SHA1f914dc94657990cf1cab167c391efaa591257a22
SHA256f87b98602b6073c68860bb3f2fbc0e491a8e5b6ac50750f45de6676a97f0e561
SHA512daf9bd755c36d4dde7df094d91dcaf5f8803c3e3edea13c2fca24a2ad139eb4aea948369e71342e5c43e203bc6f8b0b729a226c08d5cae4b884e2ffdae76313f
-
Filesize
5.0MB
MD5413b591e9885e895f1d5e94773ef0867
SHA14a848b2a5f59d96b3d41ccadb83331e4c22c85ef
SHA256c51e2d1237b398a16ec5248ce0ef977ad53d423bd4d077d8f38740cb1f01be81
SHA512602a5fda2ed4dd97f45c4bf694690a216a01e8e1a3cb640d5f2973f40230a7ec4a842bafcd0578f475cbecc2026af623e58a6fd9ebcadad9367b5cb804487164
-
Filesize
132KB
MD574a5d40e557e9d1f55d061939aead60d
SHA10de43d3493d765e38bfe1ad296c8684b1f04717f
SHA25624f391a360e57bdfbc3d96f69260bd115ee0e35104b96ebbaa1b47c06bdbb411
SHA512b5b6ffd7df581c706b6f5db00d1206f004ab09d4eb0eb2a1547520791f51d7aec1d0a67ac81d3792610c431eda6b440d584a86023595227fba54a0ec259cc6d2
-
Filesize
723B
MD5521d3e04c0ada487398e9f6aeb2e6816
SHA1cecb639806ecda68d61a8a109d271f0477529f9f
SHA256f09817127dcf211117a78f613a75e45547d4d968dba6fdf0e3c0979d8f71cb56
SHA51231e389fd52817e24c3eaefec747cf0dcd5520c36faaa7cf8199e7f7134d71674e242632d52899a708adf50b839f01859d45914d17e0e84f69cfb633a5ea5fe91
-
Filesize
274B
MD5774b4f6e7a479b6587b32839d401315a
SHA1d6ff8e3ef70c9e1508a1580141473429accac683
SHA256c42c517f14225917950dd31e50b41d27964fb253b0df5feb9656b3fb2c74d0bc
SHA51284a69e795c3db4aa60a85e89876dc028d6133951b1ecd92958501c3655549f6a0e1acd844799dda5f74c0e97aab920cf04a28179f1e9e992c7d8feadaafb058a
-
Filesize
570B
MD5421d918a12dc45d2e7422c01b1bf95d2
SHA13404289e70a2d1e8835b907a3d649ee6b017de53
SHA25647d310e73e8abeb226c323039d2d53a0b461a2e32ca9576b6301a1b5b2692ea5
SHA5126fdb1fab4e72949d0ab6ef8142daaad1f655206dcd6d3b93d060d269815e5151c5253f1c2352a1c0a8895e120b8f2fafb0d2440cb870165f319c7beb2b41ce26
-
Filesize
74B
MD51f48026df6e9e4aebc2867cb2a07a07d
SHA18098b69100ff43d1df93d7d42fead7a6aebe7638
SHA256994252c8960cf2a4008c57bb64c39a18937638230293db1ca2cbc7bc63fc8ba5
SHA5124edb34ee05c85efa311df528adc8954273fdfd6ad563aea480befee9e100e79f9492de3f26fd69ebd4bc510096866092dc24213835281d91bf8a9c536a725149
-
Filesize
1.0MB
MD54448acd2075939cc171657c23d4b1e95
SHA1a6091ea16760786e89c8884555a70b01a4cae71a
SHA256293603f6df16d20d6f8fc3d2f87151c06c8fd7fcdbc1c412b3ebfc28d59a5362
SHA512566328d3f5651182ba12c882e00a13f1dc140d0e5a192e216f220befbfaad124721aade41a5db584884b9c61d9f1e3704fd7ea480612d003694677244e0110bb
-
Filesize
241B
MD5332557d4882406795332b1828ee1e295
SHA1560b8b6e96b5f137e1b49c846e2b9f11b1ea7b5b
SHA256c39f2442c24506ff034b53c4b74987938252f924129c0d81880f440494c53854
SHA5121925658974f1e56b45901f74776763a424ca4d8427b942624ddc4f429c2967b207762842cfdff796c2f28f65a52c8e4c2b918a972bb837fd4098da42ce4aa945
-
Filesize
824B
MD57c2251eaf838790f5f13f5b29562ca21
SHA1e58fd2aa500c7579d2322264a36c61434dc5df3b
SHA25672927168d253c69470378cc6a869a9322ce59c43d5e7c08f9998a63c5777f475
SHA512c5199a866e1b3593e09e5ad69200dd0b74b767596e2edceac16a3e48a047bdaef04fffeb7047e8a4ec1960eff6b4fd16b17bfd13b620bd0158b5a68d21697daf
-
Filesize
481B
MD515adb78023108e5304ab366f6de65ed8
SHA1ba85dbca21212792b28de4e9a66ef54acf637441
SHA2565170e091aa2ffb8e4304e174c4cd0e9f397d357d5cf0d9c0471eb29965c20ab8
SHA512a885fe9cb1c5ce284682ff46b9d3ef46db75f977ecc6823826d8b94512f517857d35d847402ca58a9581594f36f907c0a8dd09a3148696b3a6dd58e2c9a176ad
-
Filesize
4.5MB
MD5ceb67b6101139270134b8a7d6bebb14b
SHA11cbbdcefb20e0247f013b67566931fb15d56550b
SHA2562d83dc965778ef7f217017e96ab8f6547484efbbad80e1cda0ccc98aa756a3ee
SHA512396bb6a0b127341537f16d8149057f2f485e0e6ecf6e60ca5535e8b977b65c387e848879c010ca51ca08965a19156dc45afffc43ef108d1dff6b5bf831315c51