Analysis
-
max time kernel
14s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
payeeAdviceDated07-April-2025_pdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
payeeAdviceDated07-April-2025_pdf.exe
-
Size
583KB
-
MD5
eca2ccd75638470aa004394ba0ce7556
-
SHA1
2c38dd2e0a3dae6b40fb5381b8cbe6a9375271ff
-
SHA256
a31907ef7aa827efdcfc036f0c4640b6a6bbfdd1e0f6a3a63056ce6c0d73c3b6
-
SHA512
1589c1ef56aff417ecb254b3f0b9aa33cd6f846c34e7b6628c017a16b4c1d59833b17c009086351005f2a47becc68c4a18a9c6faccdcc7c88d6dadb2fad590ec
-
SSDEEP
12288:ctoOoZHdIAQR5HyY2Q5XjxjLGYknelYJArEhpLBC/nlVUAV2M3j9RXRnX2o7:NOojcL2Q5Xj1LvkneqJ+4BC/lZV20HXn
Malware Config
Extracted
remcos
RemoteHost
196.251.86.105:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-MJDICZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1508-218-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/1508-217-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/5304-227-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/4480-224-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/4480-224-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1508-218-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral1/memory/1508-217-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation payeeAdviceDated07-April-2025_pdf.exe -
Executes dropped EXE 3 IoCs
pid Process 3912 remcos.exe 4124 remcos.exe 3080 remcos.exe -
Loads dropped DLL 4 IoCs
pid Process 1204 payeeAdviceDated07-April-2025_pdf.exe 1204 payeeAdviceDated07-April-2025_pdf.exe 4124 remcos.exe 4124 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-MJDICZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" payeeAdviceDated07-April-2025_pdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-MJDICZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" payeeAdviceDated07-April-2025_pdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 42 drive.google.com 57 drive.google.com 24 drive.google.com 25 drive.google.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\udkaaring.exe payeeAdviceDated07-April-2025_pdf.exe File opened for modification C:\Windows\SysWOW64\udkaaring.exe remcos.exe File opened for modification C:\Windows\SysWOW64\udkaaring.exe remcos.exe File opened for modification C:\Windows\SysWOW64\udkaaring.exe remcos.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4748 payeeAdviceDated07-April-2025_pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1204 payeeAdviceDated07-April-2025_pdf.exe 4748 payeeAdviceDated07-April-2025_pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payeeAdviceDated07-April-2025_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payeeAdviceDated07-April-2025_pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1204 payeeAdviceDated07-April-2025_pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4748 1204 payeeAdviceDated07-April-2025_pdf.exe 90 PID 1204 wrote to memory of 4748 1204 payeeAdviceDated07-April-2025_pdf.exe 90 PID 1204 wrote to memory of 4748 1204 payeeAdviceDated07-April-2025_pdf.exe 90 PID 1204 wrote to memory of 4748 1204 payeeAdviceDated07-April-2025_pdf.exe 90 PID 5996 wrote to memory of 3912 5996 cmd.exe 101 PID 5996 wrote to memory of 3912 5996 cmd.exe 101 PID 5996 wrote to memory of 3912 5996 cmd.exe 101 PID 4748 wrote to memory of 4124 4748 payeeAdviceDated07-April-2025_pdf.exe 100 PID 4748 wrote to memory of 4124 4748 payeeAdviceDated07-April-2025_pdf.exe 100 PID 4748 wrote to memory of 4124 4748 payeeAdviceDated07-April-2025_pdf.exe 100 PID 5716 wrote to memory of 3080 5716 cmd.exe 102 PID 5716 wrote to memory of 3080 5716 cmd.exe 102 PID 5716 wrote to memory of 3080 5716 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\payeeAdviceDated07-April-2025_pdf.exe"C:\Users\Admin\AppData\Local\Temp\payeeAdviceDated07-April-2025_pdf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\payeeAdviceDated07-April-2025_pdf.exe"C:\Users\Admin\AppData\Local\Temp\payeeAdviceDated07-April-2025_pdf.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4124 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵PID:1940
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\kykchyrqqjajibtjuqyxtfyv"5⤵PID:4512
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\kykchyrqqjajibtjuqyxtfyv"5⤵PID:1508
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\vayuiqbkersokhpnlalyeklmfcbn"5⤵PID:4480
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\xudnjjmmazktvvdrulfapwfvoilwgvk"5⤵PID:5304
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5716 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:2916
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:1360
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:1676
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
583KB
MD5eca2ccd75638470aa004394ba0ce7556
SHA12c38dd2e0a3dae6b40fb5381b8cbe6a9375271ff
SHA256a31907ef7aa827efdcfc036f0c4640b6a6bbfdd1e0f6a3a63056ce6c0d73c3b6
SHA5121589c1ef56aff417ecb254b3f0b9aa33cd6f846c34e7b6628c017a16b4c1d59833b17c009086351005f2a47becc68c4a18a9c6faccdcc7c88d6dadb2fad590ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5da958cd1a716966d49777581e394bfd3
SHA10ddb575aff46e9d828fea31b3f52e62863717dc8
SHA2567dcdb69e7007f681c25157d44ccb3d7d7b4b774695f217d0297a9c659278cad5
SHA51236c7836e7bc7db5dfd2119d41b9707bcdd23bf8e4032b98d0413898126e5c85e32d667c3072cb712b2b6262c04d0d336a5c443e5402c94d7a7e72c2bc8b042a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize471B
MD5c0dbbcb8c13063973855d591e2be11c7
SHA1bb47a4c34e07a04bffe7bd280dd09dd30b00f8d9
SHA256843f9d392b82b9a0a936e8f68f67ab2381f065d552e9a00aa0bc1f8a96d571d9
SHA5122bed576ea4466e8082c7aa9ee34f234832ac54c29eaca135226a6cad19fc3f1ebbfde407431184e4042459da36486b3d6718c83e101c2bc6bdfc8f2aff98e5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C
Filesize471B
MD5aa9b4ed22115231f67bbd9d9e53c3a35
SHA1b540202305cd2e6621117b086b52c51284134f7f
SHA256a9e6dfa2d356bed45a658f738669620cfcf06af8f605a12b39116727acf0c0dd
SHA5128facb334642b218722b3f8ea1ea984ccf50e0eb5443af8edbbb1b3a0fc7aa8e92b4717a45907c34f24e4a361e5292d40b84237dd0523f7f0a2c9c29eb113dbb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD50c8f917bd07fed5fb6a1c465989b1695
SHA1a78e58235e716df63afbaf3291d7d1f61c55f16c
SHA2569830c5506e05a98143a9e45cc21402f4a96fdeba2d21291359d28ac6b667eaae
SHA512c2d8ba59240454f9da36bc4fa068fb321e0d430e81a0befc6f30704db0ebecca7d2bbd89efb18f6c67eadd66e6d0d07b26e67f3b9c63498d9a38a4a5383e7569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize402B
MD5cee588257ff6abfc611dc18eff69cd9f
SHA16eaee91ee7225ecfb98a5e72dcf01171ac003c25
SHA25682ffbe630d2679c3425c314930728961344e5a99df0d1894ce467f54389094fb
SHA512c43c42c2513eb37558f9f4d042dc7545b777f477810df330295888b862cfec50d15cdd2653c54750cedf91d734f056ef64d65189662d0e7c0d282cf20736b05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C
Filesize406B
MD5751e28df7331079f00eb231dcff9172a
SHA1a6d3bc767d6eaf4872189f725e3f8e469fed9330
SHA2563b550034bb8043e31dd1a899f43a6540bfb6c68ff1703206727a21311a2ddd01
SHA512277797c1e40c258fee67a4729a69c219e9b34c3ffe4499968bc94c71de6b7602c45554a30e73af1d47cab59df99d407b1ba80be819ff513b1944c93be12423ee
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
518B
MD548676db2c51596fd2763c870870cf76e
SHA141f867588c7c757522b2ddffacecf58f1e8afb62
SHA2563ff36c24fb95fba85d10c2f36b68f4d2aa280a21039f8f6ec0ff79fda8d1a426
SHA5121ef18171778c08ea48a3fad1abee987c72ee9985960e8bc1b2e2688cc6b192fe0c3bf10eed6543d6befb6a7379368070fa0aed5037845ab984c2c56453f1afc5
-
Filesize
382B
MD5a84573b0d29196243e70dab7fe191d50
SHA1961caa5f6a205e260c8fc286a9d5fe1a99052ff8
SHA256431e922e960f759df9a2f4d7abf3b2db11d152cee219d9ade2054de60e62a08c
SHA5129f29657ae27bedb8bd60593ecf719822912c62a36e08109ac53cef8e1972e4224fc32f21801ddbf1b501c961f119711f00fdcb101b183707812c897baf405592
-
Filesize
660B
MD55c3325163caea32a52097ffb88abf465
SHA128ad774ed6489eeeac8d1d915d0658514b0b567f
SHA256ce4421a30b3093c96c99e6c4986e7e29f79f2c0b112246a932e1660578e06ec4
SHA5123b764f42aded3d59034413a75958d4b36d683b525dd7373071fd21d464ad126c6ea0eda11abe822211acfa5939eea5ddf45c3d70b623fb768e4347dfb3d4baae
-
Filesize
50KB
MD52a13e9dcb42ee98b6237bfbd9c082567
SHA19ae9118e57c198bb22c06698bd5bc318e3d37579
SHA256f87df2ef6ddebd8a5845b928b90c1573476d3bcfd7d0e3304928ffaa2734a3f1
SHA5127a490ec9c23747721dd5e32d4d7af0ac8822159d555a8023c6bf8801adf8e7400432c9608b6295132284b429ed108ed73718923a8e90407ecedb0cfd114f7a3a
-
Filesize
336B
MD50483e14b646fd46beb726c92f05dd31c
SHA1e82caae31925dff01c4c4544bb0f5e223d8f7183
SHA256d46577f5c7bf3b32aa74727a4aa4a628bed3cf050ec194919e7b6b1d89821c98
SHA51224f80c82439f6ca11aef748a29f44ec7b572da5086348d76e5be275e76048c9ec00e95d436a25dd2f3003a9b76381da6e8bd6810f56af57d7d4aba272438c9e2
-
Filesize
113KB
MD5dfabcd9f1264111f79098fc6581950f1
SHA1ccf87cb11a9db3d51a1080fcdf7bcc4f4e3974bb
SHA2564371052e97c09098899fe9a0602f242e6d758de58d07be02da416f8f2282a7e4
SHA5122246756345a4c30b937aab1348ad855a52246910cdc301c86f3112e19e6052920685a07e6c502b58c54d49d07299b64ebc007a97fbf6d9b04f45e96faf6d27a8
-
Filesize
74B
MD51f48026df6e9e4aebc2867cb2a07a07d
SHA18098b69100ff43d1df93d7d42fead7a6aebe7638
SHA256994252c8960cf2a4008c57bb64c39a18937638230293db1ca2cbc7bc63fc8ba5
SHA5124edb34ee05c85efa311df528adc8954273fdfd6ad563aea480befee9e100e79f9492de3f26fd69ebd4bc510096866092dc24213835281d91bf8a9c536a725149
-
Filesize
521B
MD5025c0ce7340eaf27653303e2cdeead0e
SHA18137619678a415c7ae07a4591297ac17b88a23d2
SHA25631d9801005850c1515518597191258d3199505df363be0ace65e330bce002e00
SHA512abca2b5f98d9d7abcb53a6f936428eaf5ba62909783235c322ab842a5b87c586c24a404ed5c1cdf32d3c212dfb10ada8dacad7dc35c0009fe4e3a495dea0a74c
-
Filesize
268B
MD552b9380e27870b853a38793e12365613
SHA16d102c5386e79efb1109a6d0e6b950ba0898ae05
SHA2568806e57f541101f67bcecb698293d12b12979260a1f3c7e2c1567ef06b646eb3
SHA51225c583cd40f81c5fa9c61a9cb8a80274515528e52b81566c1354444ec2f36ceab44e619baec55fbdd669a8775d4578186c8e16b5e8056e1454e31869defceb7f
-
Filesize
126KB
MD5ba155781cc33a60c4337f59e9ec839a6
SHA1bcad990b9541aca1f7a39b84b687d4627b8862cb
SHA256fa1341181fa7dcca169f004dc85fe9e7c74901380dd518cc12b0fb4e529743fe
SHA5120b9e0ebce9201ca1821332d2b4a4ef323195b686fa7a8eae7c4647c4ed722999aa09974661e06c8bfd9cc35f3efc7ec801271745de982142cfdc87dc0790fbf5
-
Filesize
382KB
MD5911c13a266b9a91b7e7ac0982a71cb06
SHA12a3c99abd3fddb12f86384254acd698bee06e352
SHA256ee34196be742d76ec15250aebc0a5ab68d6d1c6c336fb1565f23d010f926c60d
SHA5121db2f5c9a9ad584dc26b3d86beb318e9c7b03293539678b0b1d00eaefda04a9d0ecbefabe493e2ae48c1ae99cd01dfe32afad613d65413037b9233b2b23cc55e
-
Filesize
338KB
MD5d8ba0a8cd8ece1061438654fc2710a75
SHA1de772509ba346bf67e6ecc15c468cd46fc5803de
SHA256447f3b1eefc4e7eb1f62037e60acb8eb6fbfdccbaf118fce820929e5a4b52f28
SHA512b4af6571377453a5c9144a66a698463abda3e041a32f421b9a373c3cec933a75596198de694c0c2e19b8ebc1696d2f4d4180e4d8245a37e0003b8ad205fda28a