Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 13:57

General

  • Target

    ca96400ac91b18edba9f7ea173141775dba4ec1f92cc50a5717d2d485582566c.exe

  • Size

    1.2MB

  • MD5

    c063c7d505c25af7464568034cb36887

  • SHA1

    4035e5a4010d6cbe1bd77cdd280aea44900c489a

  • SHA256

    ca96400ac91b18edba9f7ea173141775dba4ec1f92cc50a5717d2d485582566c

  • SHA512

    7ee384a473fa324cf550943626669ce308fd95b2f31a360e2905e987255925f9f1314cd13350fd9ccbe9381062f470a7238263096b7cb1f38b27b76afa4c0791

  • SSDEEP

    24576:ntCh8jhIN3f4tOGIpZcwZmnMD8oV981LboGlUoytcJqc1domn0UZ4a4LW:n9+PfGIpPZQMDLobUpBMmu5ZEW

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

196.251.81.9:5555

196.251.86.234:5555

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3WN2UX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\ca96400ac91b18edba9f7ea173141775dba4ec1f92cc50a5717d2d485582566c.exe
        "C:\Users\Admin\AppData\Local\Temp\ca96400ac91b18edba9f7ea173141775dba4ec1f92cc50a5717d2d485582566c.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Windows\SysWOW64\CMD.exe
          "C:\Windows\system32\CMD.exe" /c copy Scripts.aif Scripts.aif.bat & Scripts.aif.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3652
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1140
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4872
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
          • C:\Windows\SysWOW64\findstr.exe
            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2828
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 653384
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3116
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Sofa.aif
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4564
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Programmer" Useful
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1128
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 653384\Surrounding.com + Ground + Batman + Poverty + Oman + Surgery + Prairie + Tm + T + Bobby 653384\Surrounding.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4640
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Nearly.aif + ..\Olympus.aif + ..\Backing.aif + ..\Kim.aif + ..\Sf.aif + ..\Favourite.aif + ..\Provinces.aif + ..\Frog.aif + ..\Attended.aif o
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1352
          • C:\Users\Admin\AppData\Local\Temp\653384\Surrounding.com
            Surrounding.com o
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4748
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3316
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPenguin.url" & echo URL="C:\Users\Admin\AppData\Local\SecureNet Dynamics\CyberPenguin.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPenguin.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:3640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      3c268953e22b75fc3f67fc983eb348ae

      SHA1

      d522bc9f07232c0d40aa2a1de004d4d0fc168bf9

      SHA256

      6f1f375867a3d9e52acbcff698b3a00bad6357cb2e6209b557963d6e124b8c18

      SHA512

      f30e7dacac86f4ad7c29db20b3e587471471263f0a461b63793b81d03656ddf8881c3b0dd462c23f998030a517a8bf6e0265ca8e0a8aa8bd227c6ba90063a127

    • C:\Users\Admin\AppData\Local\Temp\653384\Surrounding.com

      Filesize

      1KB

      MD5

      4de5684cbe4aaa3ce9b5c96192cd49a3

      SHA1

      f2484f47133bac941b7e5bb120b424d93845d699

      SHA256

      cd0071916f4058f1c12ce8dcd761cc077d8de1724580bea133251a1a40e66192

      SHA512

      b39187687d5e84bf8d9ccc03e81a4fcf1be15d5a5e91d1d13a81fc3b3ca930a3911e9fb86e15f5af8fedec0aa6c1fe4ea618fb2821a87a2e9940809ba3a24b10

    • C:\Users\Admin\AppData\Local\Temp\653384\Surrounding.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\653384\o

      Filesize

      664KB

      MD5

      300c2363c479217e84f59dafca570d89

      SHA1

      4fa85cb9732e681f7fd21a99673b2228741cba2b

      SHA256

      304c60ccf82fe1db59f259da7fefc24ee149fc6ff292fd218a226e1797813371

      SHA512

      f108c4c212ee713ab9cfe8f4448a8e152fbccd0e7be476db614c899d5635727b69698e61df862ba2f3b882000a7f9705dcfb09f23e709a5c761760ae2ec98c4e

    • C:\Users\Admin\AppData\Local\Temp\Attended.aif

      Filesize

      73KB

      MD5

      a6a4e0f80376a07d85a031a2dc53edb4

      SHA1

      8ecf5a4086f2d80fc646de190279b97e970a72f0

      SHA256

      88711b3d6222c0ea6d65b10ce822356796a350f961aab4b26f70b92c6e5fc9d7

      SHA512

      cb623813945f22053ac0d4cf4f4477d66fa8ef430bba4d52a2b08b3418679fa98d938855af2c651a4966e8de4947e261d8296d5acb49c327d20bb8648924fa0e

    • C:\Users\Admin\AppData\Local\Temp\Backing.aif

      Filesize

      70KB

      MD5

      9e3fbc7ae75a72b0a0f1257e2bba4ddc

      SHA1

      a7e190963ee138e894ab2c32a16d6f86ce29edb4

      SHA256

      7d985ec996c0110792e546f1b99565582f8bcf8e1e6943e0d132653b8546c736

      SHA512

      3acf663e6ab6d4aef9aec2ddb72c086e10d0d62ea2d19561f07735be75530111e9f1f6a168259d067415e30561e57d4533be04a7e82333dca950ede512fa319c

    • C:\Users\Admin\AppData\Local\Temp\Batman

      Filesize

      71KB

      MD5

      c38b407edf17118edce6154cd86259a3

      SHA1

      190e96a20606ba28a69918d4c91b5e7036dad75d

      SHA256

      a9b7e517c8a5a3d36dcfca6cc14fb43fe47a882158fc22ec8b8a556859d1b481

      SHA512

      1f378f60ceb5bbb1dd9fb821fbe6980ef0e2a2ab69d9bd256363e0c47a08a2f14e6c72a72f9cfb7bb5b02594c407bd17751778ca0054b7a0bfea03229aadc99a

    • C:\Users\Admin\AppData\Local\Temp\Bobby

      Filesize

      60KB

      MD5

      5811b919da8f6524562fd135306c64ea

      SHA1

      b160db444708060363e86528c933e823db64cedd

      SHA256

      d1243b4b1168800c46e2f67d1e0017264e0db30f206710c1f92294abaee7c00a

      SHA512

      6935f3c602e5bcba33089973750900a43fb609d23e1886dcf027ff3262e0eb698c5ea4b4a0a0e3ae66d30ed6471fe3e58c4e2581d91d89896c6691129cc15d53

    • C:\Users\Admin\AppData\Local\Temp\Favourite.aif

      Filesize

      82KB

      MD5

      e17f3a57f228f84ac0557f040b3fd3a3

      SHA1

      4c8fa3595b500737a154e58467a1fd45d912d7d6

      SHA256

      026cc6881eb76c1edd3f8a0cfa423e8ee4e7593074d12122e520d026475ce23f

      SHA512

      2d5e2df66b492670b067e5c3cf9518f9f414eaa5e9e9712b4d6a21cb37864af7bd0cb531224f241dad8804044d106145f497ba5d80169396891c643849e13779

    • C:\Users\Admin\AppData\Local\Temp\Frog.aif

      Filesize

      75KB

      MD5

      cd014983e74ab73db2f213668a8c54e1

      SHA1

      2b7567e889b0c48c54d87dd772cff26d216baa92

      SHA256

      cdb917bf5f95e15b565ff5860af88868d4c3b7d2e74f90a4328c1d6a5ee5e48d

      SHA512

      8a2e330adc3ccf9ed37b630bd9159d59853823e94a0ab147ad25263a01af5def17e9927e34c9e3faaa4ce088fe277bb6adadde64e3702f7981fd9cd95a644dae

    • C:\Users\Admin\AppData\Local\Temp\Ground

      Filesize

      130KB

      MD5

      2dad27147b37a7545e77a45623ad8f7b

      SHA1

      5fa82af638bb582dc8801c4a458d660727eb62b5

      SHA256

      b2058e2d4b0d287bbb83fa84dbfa766c016aae6976221226fbdb945010424a49

      SHA512

      d7a34b599c54957040dcd98f0d01f5382bb376b48fac2f307c48a4402fc6712b31a7fc19ca4e841a15f688e7ee8dc0083156f915363d72f23a95c2225004ecde

    • C:\Users\Admin\AppData\Local\Temp\Kim.aif

      Filesize

      64KB

      MD5

      b7c5b2528e6e994faf79447de611c5fc

      SHA1

      197176e9104db83508315145f10dd66975c0d13e

      SHA256

      bc139ed976094ac5a7a6d655f3b1810e7783b0eb148d75b51839d670a8722caf

      SHA512

      82e424860aac74050c0cfe00a53c60ab6b4e8db43313e9f1713c109f0ca791684ec4813be6da9625aa26c53485b158a5ed69e5d1963c77117d78fcee1a2c8b6d

    • C:\Users\Admin\AppData\Local\Temp\Nearly.aif

      Filesize

      61KB

      MD5

      c10e1a206de17aa5a60af10ea856328c

      SHA1

      894cbfc90e55cf871a24c67c42602ce8d193aae1

      SHA256

      4552180b842180a985b4e75d91ba7cb5c68f23f5e24b38fcb4729934664a92ea

      SHA512

      e29dbb4bcc293cb9607d6551f214d66604b3e25ec321669004e6281443f1dd359cd4a91931eae7ad90ab5ec9930b9073ec9ecce566ba032513a354021450b102

    • C:\Users\Admin\AppData\Local\Temp\Olympus.aif

      Filesize

      72KB

      MD5

      de2126203da7c14ab166a3f969476fa4

      SHA1

      e3a154e473127939d8e5acfbd07202792375161d

      SHA256

      885ab4dff224d0984caee94b234972b9e26b50d30ed0b7f04958d52855684b92

      SHA512

      df8e7477486f197bdcebdca4f3764b9aea74f4ac27922f82cebe84893b4d8e46abd1e560377b283c42ad7384c44ed977ce0ddf68f7fee95208b95be0b8a86fd3

    • C:\Users\Admin\AppData\Local\Temp\Oman

      Filesize

      138KB

      MD5

      bcc285227712666c16b6d8d1fdad939f

      SHA1

      88ca0a2375d3a28e6480e6069cc8578b95855298

      SHA256

      881ac3765b208a9fedf61d272873ecea0a447672c1bbd3ac9947fbaad1193050

      SHA512

      af711dc7159a529fa789879b941cb7431a14d4ecf5f57e0e8b967593b4001fb282d7fea3142466e818ea855704ba63437f71235cbeb26b8aee5ab9a3299b9e0c

    • C:\Users\Admin\AppData\Local\Temp\Poverty

      Filesize

      90KB

      MD5

      b0c71ef2c6fa9fb223b6adca3359c2c8

      SHA1

      5ee3be956e5284ed7f6916b6123e99bddb77f756

      SHA256

      3f8c40f9eb23610c8eb97eac10e4868508bd11ddf9c3d30f1f14965b94850444

      SHA512

      5e1c4228d232711f2ee067a1d12e093c676c96b9cc496330cabd090a0d7befeec0fe839213220e234e7ccb32856a943ed60d7de3603f5c101d7b0daf49263255

    • C:\Users\Admin\AppData\Local\Temp\Prairie

      Filesize

      90KB

      MD5

      d983dee7a8f036e932858fc238c64b8a

      SHA1

      88029e6e3a767d51c7cfbbfff3eabe2f70a1cb5b

      SHA256

      4b3daf475d7215b62d52f4f421a05b38da4839b868704a5dc057dcb54a86caab

      SHA512

      51fe7418a918d96ed52344fb270c8905eee31f8258f250ea858c5a9cfe441d42751e3d9c171649e69c2fdd1f6642a2af8348d4bd0432801b04618d74aeafc294

    • C:\Users\Admin\AppData\Local\Temp\Provinces.aif

      Filesize

      85KB

      MD5

      da83e23b27292d93735172bf6cb501ee

      SHA1

      b325583ff12225c6cb3d6c54bca0493a476666de

      SHA256

      837de395b16eadf807632025de076485ec0e7c54edf333c8a3c57c0c147eecd4

      SHA512

      901e0b79a82891ee4e6be31aa08cec897755c0ee1fb3b424b4de32945f7267d91690bf90ed0bf6a0fc5469d41f33efb7845fe9a4c0eefefe7e242c1421436029

    • C:\Users\Admin\AppData\Local\Temp\Scripts.aif

      Filesize

      25KB

      MD5

      504f3653da9332d26a214a211b832fcb

      SHA1

      30bb1d72d46861e212e3ca2128e56f790902dee2

      SHA256

      f4710e5315f355d275e574ff79ebe9fb17585919a0e0b8830e57acc285c03ae7

      SHA512

      ed710a496d5ad790a2899313f12afd28532b53dfa5e06c4ab130f75f26568a3277307e0ffe994f7b8ff1e39ea50f9992863377382228b8135eae385ccc32beab

    • C:\Users\Admin\AppData\Local\Temp\Sf.aif

      Filesize

      82KB

      MD5

      b373cbba0f06659309673959c5f8b223

      SHA1

      6531f7345937c9c30f735a22d344fc73bba2636e

      SHA256

      00a79f7b3a4486bdf1b1a2aa87877b21e73ceb7c4c2813423ca1433ff01b5151

      SHA512

      ad208624732c188570ccda40fc83b9c67c7c2662f06bb045e8460aa4209bc3fa862c59cdbfee164b92ed963311bb04c6e4bcea80fe4f11e001430416e761a59a

    • C:\Users\Admin\AppData\Local\Temp\Sofa.aif

      Filesize

      475KB

      MD5

      c77590e970b4bd65e31608f78b054a71

      SHA1

      e65b385778a04faa9918b597542f1324c9650a52

      SHA256

      73d0d2f89a0f0e6a7b502d73257970ec492d122bb5c2e7706a27ce15ada9e5da

      SHA512

      21aef88fe98338ab7976c35eb1c3d8e3a17a28e8817e382fb179606cc411d2b057fb542f4fbdcca593c9ce08811eea51ad326a381206e3e5ec3867e50a01f07a

    • C:\Users\Admin\AppData\Local\Temp\Surgery

      Filesize

      148KB

      MD5

      a8b3b33c5a94a60373b48993913346bf

      SHA1

      91a19a9802fc207df9e318d1a60d7f9b42761920

      SHA256

      935b8794ff2b52e79d62c3b907b86c36dcbd255a4c4b18da59db6d4c39d42c30

      SHA512

      6780c51138aae460b34902c2ab85cbb3ca9a63027801f70d5625adc0104fe3b393fd43aec194e446f497b2207c04cdb62fa80d759ead87eebb6e5749f3c4f184

    • C:\Users\Admin\AppData\Local\Temp\T

      Filesize

      132KB

      MD5

      1d949b346679dcef533c71b526f38865

      SHA1

      5bd45808bf74de0f60b291dbd07672d66ca2ad0d

      SHA256

      3e992a0e12416abb98b0ddaace235bde1a768a24b6d97203cf6900fb3bd40e74

      SHA512

      a207a438e4aad12d80228e136dcc7eb61282a776c1a20b75199cbf0ff88bf696782620c2159b002fc7ee2d51f5c0629b5f9d4048f52ba950228bce2a4d0a0130

    • C:\Users\Admin\AppData\Local\Temp\Tm

      Filesize

      64KB

      MD5

      47b7ac4f98cff043f5f7e2361d4a373c

      SHA1

      ebff66d21e7c09d89bcc61d2888d2b21ffdbe92b

      SHA256

      98db1707f3c48756bd0385b62593f6c4d4ffa167ac1b6faab3cd92d458e88868

      SHA512

      24039511bfce5fc39be8846d7b240e6d1c31677b4b4dc00a78e6d684312ad9df34918de403daac5297a91d8191b06f8595f828874fa4b7048605046e3d918c68

    • C:\Users\Admin\AppData\Local\Temp\Useful

      Filesize

      1KB

      MD5

      0e595b03434e27f211d998bbe9d8adbe

      SHA1

      7fb9107a7776e91b1b26c429d4e5d238f2abbe63

      SHA256

      5bb58b3009459b0db94f3c93c6e77af258b76e85eb321a917f7ea41d2152bbd6

      SHA512

      65fa31d28acba4e2084106a75a7373d1c6afe09c27d6f59c0b69e26ae2a8d7997fc95edd1ec2074a15d8b9cd19299a5ce7c029524aa9c9a8db46dafa024b68eb

    • memory/4748-642-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-650-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-641-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-639-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-643-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-648-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-647-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-644-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-649-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-640-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-651-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-655-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-656-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-638-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-663-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-664-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-671-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-672-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-679-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB

    • memory/4748-680-0x0000000004400000-0x0000000004480000-memory.dmp

      Filesize

      512KB