Analysis
-
max time kernel
0s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2025, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
Pharmacoposia.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Pharmacoposia.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250410-en
General
-
Target
Pharmacoposia.exe
-
Size
675KB
-
MD5
0ef8c8c1eee5fe77118d59cd697d7bf8
-
SHA1
3be8115e6b62fce5e97fbb8503604cf562593077
-
SHA256
7480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87
-
SHA512
ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147
-
SSDEEP
12288:+Y/HaoayvDfkCtB15zvZElgjkqJhtU4LdNG1uRX9n32wP4+0E1DhiaOmpqCqm:+Y/HaDOvB1RxElgjv3thLy1uFlmwP4V4
Malware Config
Extracted
remcos
RemoteHost
196.251.116.149:4507
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z3DUGJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 8 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/4556-171-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/4556-172-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/5444-183-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/5444-185-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/5444-186-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/4712-180-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/4712-178-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/4556-189-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/4712-180-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/4712-178-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/4556-171-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral1/memory/4556-172-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral1/memory/4556-189-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Loads dropped DLL 2 IoCs
pid Process 3004 Pharmacoposia.exe 3004 Pharmacoposia.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 22 drive.google.com 23 drive.google.com 45 drive.google.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Objectee.ini Pharmacoposia.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin Pharmacoposia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5700 4832 WerFault.exe 106 2244 4832 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pharmacoposia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"2⤵PID:3416
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵PID:860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:1972
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:1500
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:4700
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\gvbtivtoxqwcarfexxgfwkxuqyioqb"4⤵PID:4556
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\qxoejoeqlyopcftigityzpslzerxrmxsj"4⤵PID:4712
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\aruwc"4⤵PID:5444
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:2476
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:2340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:3988
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:4868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:1716
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 11523⤵
- Program crash
PID:5700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 11283⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4832 -ip 48321⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4832 -ip 48321⤵PID:1088
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD50ef8c8c1eee5fe77118d59cd697d7bf8
SHA13be8115e6b62fce5e97fbb8503604cf562593077
SHA2567480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87
SHA512ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b03438ca6632d11b3ced5c88fd99795a
SHA15184614c57d0d93e09de47804a43e646da7252c6
SHA256a649f25a360c5854086d6985c8b9b15a33b8182347e4ad59b081daa0bdd8b775
SHA512d593ad74fede1dc8a9a41903ec2e3df278a61d5d743054c0b0ce9b2c32a99620b698b8ead4d0c08f18f25c6560c6ab935e3e22eb04c81b4db1f699163ced1593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize471B
MD51d4632adbc075ecbc910f1dc1ea7aab7
SHA1aefef0d5a36d2ccbb0269d89acd7607c185563b9
SHA256da21852c5ec264fdf502462af387cc11b877e6df1a9cf6aa11634f084bde188f
SHA512e024a6cc7f80cf0b70479bb3d98593f7b2ee07ecf37eaa892a828f889614cdce3a6a3cb203a02d7150b593f2f48e9bf1e80635b07f2fe6d2a7f5685f6b9fe34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54295b6385f115d80731a27ab2f1bb79d
SHA13bbeb7f447abd236eea211e6f2850c6181fc5b99
SHA256a61828b3d5a8077a726f7e9a3929eb8b7402798a3b9a9d4fe026e2525cf31ebf
SHA5120ed452b4cac6e7cd9bf04697246116586ef3489fe8f63b92e4e043d4f4d4a15f299cf5114836895af9fff1d958ed66021cce8912c3597639246509b10e366aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize402B
MD5b642d3c91e2d58e7f53ad9dd57776ae9
SHA1dbfeed496aa69cff9e5c04cdea7ed470dd02a523
SHA256ee385de65b1262032718db06bc9afe15ce5553708bbd9ee763c55bb803849e7e
SHA5123b66a924cc1a30d48675fc4698072b4f2b54d33241681c90b394af9c69adb786232cb67f8f96c9c5527d73bafc40f599640e75ca66d5078ee26c8048385edcab
-
Filesize
4KB
MD5e46c5dcb5286bd1c835259b73099d118
SHA12870c9fa8901ffe0dc4361c88877285e47b579b0
SHA2566a5876256a5b038791452c8d38226966e23587c238d8e5b7a3ce2599dfb2dd53
SHA512490a09557c282933323d95896958751406fa190ee04fe1fdda33392bd7f97cf7d5dd4b241979eec648a0e63ce6ab3562441004ae12e1cc0fc1d3ef1542a254d0
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
343KB
MD592c8f4a08acfba6adf40657545e681bf
SHA1e8bb7f5c1adf1f371066bc233b242e144e5d8fb0
SHA2567d87a7aa53dc16dd7d85f9ee84979f3931213eb016381d5c3d5724ba8470076b
SHA512ec192515bd39862d9052558702d9b88db2af1fc3946fa7d096efe325855da5cb78ee5e1c6afe378232afb9f3b6b7c68f9f5aeb3c8cb9b129310f54799fa910c8
-
Filesize
97KB
MD576aa50f1e0bcb4ed44e0da686fb1115a
SHA1c2083f4218ab03cb5dd7e1fa12cc5b026a2b63fb
SHA256d7e7113a11841604012fdcb8037ca28de5161a3b9ccffcb8440fba1847e128d8
SHA5129e295d7881d9e7341f1082221bb5f5ebeee0fa9cb02c6c5ae58194037be23611e5e3a910101afa7509467445a430f459fb3c54016e2874df45781882a0498be4
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\myocardium.set
Filesize394KB
MD5e394eba898e6c64de87228a8e2f86480
SHA156d3342568f90282edcb24da3d79559316d1f181
SHA256f2eaac6d269bf7ba5e033a525359ea1865dcb4008f8d320fa1883e90705b74f2
SHA512bd99eaf068ac0309ddf6ebfe7862dcd33b5fbb4cb350a7f18791d984600e70978e00348a32e0e8157e8a145eb50c18dd9617684ae3f009932eacdc67ba115413
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\noncontestable.sys
Filesize128KB
MD53baea18c0f478cccea8a471cdfd3c839
SHA1696d089f86e93217b7b2c7ca9e867b03f0314d2d
SHA256688bfc610d0021755782c957a75dd8e385a8bb74bbed3aec0f9931003c9d1d38
SHA512eb182210fb659c6751c306fb68851e409970f64b3784b1ed13c3c39a3606e04d3ad99456809cf940162062626dff6c032f279077cdb8df42b1ae38c1f963b1ca
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\noncontestable.sys
Filesize356KB
MD51c0e5e3fad38ad4c071145b0c91b1c75
SHA1d4332d34c719454b251de7fea2f7ebf74e9ce59f
SHA256c9d19087bf0a5cce7b23a791be76d2ed701b7dce69f86baefaa99e7a19fb1567
SHA5129b71e0ac39de87e365d87df4052922d545f90e9b899b962459b9f9e5598a19a36ce247e03cc916d76feef53c5a54a6ae7bb8694e08cfa28822a522f2782a6689
-
Filesize
8KB
MD5a798defe4bd96ce304a2b64ba9db9451
SHA1ebe61d1bb9f882db6779e125239c94e24fa31ac8
SHA2564c4e725a9de497a0171cb912ae1039cf782bdda0791bc15e6960c643f36282b7
SHA5126e5b183e0fd717c7f56318f6cb8b2e273c5541d1c0205cb9af317d66a062613c9d5e08d601ed8164c6bb785349482f2406db34254bc886898a165b3608aebd69
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\wineshop.ini
Filesize616B
MD5059cb6042549f01a636176876a196d29
SHA1434624b61da12f82cd9dd001cf89071e289d6692
SHA256c937269a7ddc6b76b73dd9cbd9e64b318665f2c622b00a7ab6e8d0cc31583c2c
SHA5126fdd35b9bd2494f7a4831779cf5e55aa7620cc41c08915aca25279dc071f2016e6960c9c50a4d709a64a7b2d01234b11144e82159ad8a671535cade0c66ee208
-
Filesize
321KB
MD52bd23a1fe1db40048da512bea4500417
SHA1983f7443e7c4c8a37cc92b06b9aefee6e6bf57b9
SHA256f90b84e5e4fad7afcec2a9f9d29fbacde444ff121f6b1801c2dce6748fb05068
SHA512e0ce68c81576f52643b59ac448b949617810a62f9b093073304a443d879ab671b006a58c0e50b29197bf053c4d8c01670a3b9efe0d564dd9dd85e160bd281509
-
Filesize
25KB
MD5831bca259fe0af3064464de13120377b
SHA19e8a6d534ff671ba8fc78a93d7434ac6684bee40
SHA2567b5348bdd44c897d7299a842583ee15f35730857d37e16b20029a312eb3ef0c5
SHA51286819548a32a72ecd60291922ccf19d0140f264dc353c42b5d3d8f45010617a700c32c511ce5e29391e134f9dd9aa016e84e33a646f121e79aaa6fc6362f28fd
-
Filesize
370B
MD5313a9633a58de00315d4b8a88456dbd4
SHA1ac8642ba8fc5ad947be76992b388ba90c1f4f29d
SHA256cab61979083d60310c85253bc87b5047a40869b56f1d78885f45556a809f47e8
SHA512c274194f91eff6525d039f602bce9294ebfd805ee1382946a3f89fdf6e6c7e315ff50462c54c51a80da97de66c75e2b450d626b28ac31f391c85f9a6de1f87d1
-
Filesize
39B
MD5cfc5144c3a75d5f817151ecf6e59b0f3
SHA1324399c734ad798dd6f1eead4534f6f9e6bbdd21
SHA256e8ec675329b6f0e7223548d4dae4fe8787e077ea654913ab4509d927ad5e0bba
SHA5121e91beba4352d45e4a784956c4b2c7cd19f3cc38bece8aa1f0729e4a4b6f334d8b55ff1083bf42c942b7c755740adae4e316654828c4c004bc838671505b2adb