Analysis
-
max time kernel
34s -
max time network
144s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
Pharmacoposia.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Pharmacoposia.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250410-en
General
-
Target
Pharmacoposia.exe
-
Size
675KB
-
MD5
0ef8c8c1eee5fe77118d59cd697d7bf8
-
SHA1
3be8115e6b62fce5e97fbb8503604cf562593077
-
SHA256
7480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87
-
SHA512
ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147
-
SSDEEP
12288:+Y/HaoayvDfkCtB15zvZElgjkqJhtU4LdNG1uRX9n32wP4+0E1DhiaOmpqCqm:+Y/HaDOvB1RxElgjv3thLy1uFlmwP4V4
Malware Config
Extracted
remcos
RemoteHost
196.251.116.149:4507
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z3DUGJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4060-171-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral2/memory/2420-182-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/5552-174-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4060-170-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/5552-174-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4060-171-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral2/memory/4060-170-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Executes dropped EXE 3 IoCs
pid Process 2460 remcos.exe 3516 remcos.exe 3160 remcos.exe -
Loads dropped DLL 4 IoCs
pid Process 5064 Pharmacoposia.exe 5064 Pharmacoposia.exe 2460 remcos.exe 2460 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2627618461-2240074273-3604016983-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-Z3DUGJ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" Pharmacoposia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-Z3DUGJ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" Pharmacoposia.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 19 drive.google.com 1 drive.google.com 2 drive.google.com 11 drive.google.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Objectee.ini Pharmacoposia.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2364 Pharmacoposia.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5064 Pharmacoposia.exe 2364 Pharmacoposia.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin Pharmacoposia.exe File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pharmacoposia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pharmacoposia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5064 Pharmacoposia.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2364 5064 Pharmacoposia.exe 79 PID 5064 wrote to memory of 2364 5064 Pharmacoposia.exe 79 PID 5064 wrote to memory of 2364 5064 Pharmacoposia.exe 79 PID 5064 wrote to memory of 2364 5064 Pharmacoposia.exe 79 PID 2364 wrote to memory of 2460 2364 Pharmacoposia.exe 84 PID 2364 wrote to memory of 2460 2364 Pharmacoposia.exe 84 PID 2364 wrote to memory of 2460 2364 Pharmacoposia.exe 84 PID 1328 wrote to memory of 3516 1328 cmd.exe 85 PID 1328 wrote to memory of 3516 1328 cmd.exe 85 PID 1328 wrote to memory of 3516 1328 cmd.exe 85 PID 5080 wrote to memory of 3160 5080 cmd.exe 86 PID 5080 wrote to memory of 3160 5080 cmd.exe 86 PID 5080 wrote to memory of 3160 5080 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2460 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵PID:2620
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcitpkywwrtwclgojmnqlrwlnruzp"5⤵PID:4060
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\jxnlpcjpkzlamzusswhrweqcvxeiicywk"5⤵PID:5552
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\uzaeq"5⤵PID:4124
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\uzaeq"5⤵PID:2420
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:2192
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:3556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:5268
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:5828
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:4284
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD50ef8c8c1eee5fe77118d59cd697d7bf8
SHA13be8115e6b62fce5e97fbb8503604cf562593077
SHA2567480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87
SHA512ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b03438ca6632d11b3ced5c88fd99795a
SHA15184614c57d0d93e09de47804a43e646da7252c6
SHA256a649f25a360c5854086d6985c8b9b15a33b8182347e4ad59b081daa0bdd8b775
SHA512d593ad74fede1dc8a9a41903ec2e3df278a61d5d743054c0b0ce9b2c32a99620b698b8ead4d0c08f18f25c6560c6ab935e3e22eb04c81b4db1f699163ced1593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize471B
MD51d4632adbc075ecbc910f1dc1ea7aab7
SHA1aefef0d5a36d2ccbb0269d89acd7607c185563b9
SHA256da21852c5ec264fdf502462af387cc11b877e6df1a9cf6aa11634f084bde188f
SHA512e024a6cc7f80cf0b70479bb3d98593f7b2ee07ecf37eaa892a828f889614cdce3a6a3cb203a02d7150b593f2f48e9bf1e80635b07f2fe6d2a7f5685f6b9fe34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5916f806326e4f271482a1a65b9e2abd5
SHA1aafaf9f9bac14512ffde139f74b5a8760e0b76ae
SHA256861298643d32c5cffe60c3afa452b8cf27c8ff86f0e1ac6be294c7eb579975bc
SHA51268d5eba2e4492a2fe17eefd1e83f6eeb3f4088e1975cd9e135403e8d1d0918d8e4db55f272f0456c6aca7a83812d685cd4e04940796fdba03e5d64c648ea28dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize402B
MD59765660dedd69a11377ceeda9720ddec
SHA18b8f137a16778ee8ca36454824cb7daeb92a4bbd
SHA256fd8e6452e6ea7c5945f72764a7d04c7955a5821a76230b3b03e38905353616e8
SHA512dbae50baeab87136fc1b7d3e3aa72f25a8b0d2c4c210016db58329d78f554ee5ddab612ca45f017d1e9d9462a4e643ed30332c721d6bd09a104457228724dd5b
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
343KB
MD592c8f4a08acfba6adf40657545e681bf
SHA1e8bb7f5c1adf1f371066bc233b242e144e5d8fb0
SHA2567d87a7aa53dc16dd7d85f9ee84979f3931213eb016381d5c3d5724ba8470076b
SHA512ec192515bd39862d9052558702d9b88db2af1fc3946fa7d096efe325855da5cb78ee5e1c6afe378232afb9f3b6b7c68f9f5aeb3c8cb9b129310f54799fa910c8
-
Filesize
97KB
MD576aa50f1e0bcb4ed44e0da686fb1115a
SHA1c2083f4218ab03cb5dd7e1fa12cc5b026a2b63fb
SHA256d7e7113a11841604012fdcb8037ca28de5161a3b9ccffcb8440fba1847e128d8
SHA5129e295d7881d9e7341f1082221bb5f5ebeee0fa9cb02c6c5ae58194037be23611e5e3a910101afa7509467445a430f459fb3c54016e2874df45781882a0498be4
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\myocardium.set
Filesize394KB
MD5e394eba898e6c64de87228a8e2f86480
SHA156d3342568f90282edcb24da3d79559316d1f181
SHA256f2eaac6d269bf7ba5e033a525359ea1865dcb4008f8d320fa1883e90705b74f2
SHA512bd99eaf068ac0309ddf6ebfe7862dcd33b5fbb4cb350a7f18791d984600e70978e00348a32e0e8157e8a145eb50c18dd9617684ae3f009932eacdc67ba115413
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\noncontestable.sys
Filesize356KB
MD51c0e5e3fad38ad4c071145b0c91b1c75
SHA1d4332d34c719454b251de7fea2f7ebf74e9ce59f
SHA256c9d19087bf0a5cce7b23a791be76d2ed701b7dce69f86baefaa99e7a19fb1567
SHA5129b71e0ac39de87e365d87df4052922d545f90e9b899b962459b9f9e5598a19a36ce247e03cc916d76feef53c5a54a6ae7bb8694e08cfa28822a522f2782a6689
-
Filesize
8KB
MD5a798defe4bd96ce304a2b64ba9db9451
SHA1ebe61d1bb9f882db6779e125239c94e24fa31ac8
SHA2564c4e725a9de497a0171cb912ae1039cf782bdda0791bc15e6960c643f36282b7
SHA5126e5b183e0fd717c7f56318f6cb8b2e273c5541d1c0205cb9af317d66a062613c9d5e08d601ed8164c6bb785349482f2406db34254bc886898a165b3608aebd69
-
C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\wineshop.ini
Filesize616B
MD5059cb6042549f01a636176876a196d29
SHA1434624b61da12f82cd9dd001cf89071e289d6692
SHA256c937269a7ddc6b76b73dd9cbd9e64b318665f2c622b00a7ab6e8d0cc31583c2c
SHA5126fdd35b9bd2494f7a4831779cf5e55aa7620cc41c08915aca25279dc071f2016e6960c9c50a4d709a64a7b2d01234b11144e82159ad8a671535cade0c66ee208
-
Filesize
321KB
MD52bd23a1fe1db40048da512bea4500417
SHA1983f7443e7c4c8a37cc92b06b9aefee6e6bf57b9
SHA256f90b84e5e4fad7afcec2a9f9d29fbacde444ff121f6b1801c2dce6748fb05068
SHA512e0ce68c81576f52643b59ac448b949617810a62f9b093073304a443d879ab671b006a58c0e50b29197bf053c4d8c01670a3b9efe0d564dd9dd85e160bd281509
-
Filesize
25KB
MD5831bca259fe0af3064464de13120377b
SHA19e8a6d534ff671ba8fc78a93d7434ac6684bee40
SHA2567b5348bdd44c897d7299a842583ee15f35730857d37e16b20029a312eb3ef0c5
SHA51286819548a32a72ecd60291922ccf19d0140f264dc353c42b5d3d8f45010617a700c32c511ce5e29391e134f9dd9aa016e84e33a646f121e79aaa6fc6362f28fd
-
Filesize
370B
MD5313a9633a58de00315d4b8a88456dbd4
SHA1ac8642ba8fc5ad947be76992b388ba90c1f4f29d
SHA256cab61979083d60310c85253bc87b5047a40869b56f1d78885f45556a809f47e8
SHA512c274194f91eff6525d039f602bce9294ebfd805ee1382946a3f89fdf6e6c7e315ff50462c54c51a80da97de66c75e2b450d626b28ac31f391c85f9a6de1f87d1
-
Filesize
39B
MD5cfc5144c3a75d5f817151ecf6e59b0f3
SHA1324399c734ad798dd6f1eead4534f6f9e6bbdd21
SHA256e8ec675329b6f0e7223548d4dae4fe8787e077ea654913ab4509d927ad5e0bba
SHA5121e91beba4352d45e4a784956c4b2c7cd19f3cc38bece8aa1f0729e4a4b6f334d8b55ff1083bf42c942b7c755740adae4e316654828c4c004bc838671505b2adb