Analysis

  • max time kernel
    34s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16/04/2025, 22:46

General

  • Target

    Pharmacoposia.exe

  • Size

    675KB

  • MD5

    0ef8c8c1eee5fe77118d59cd697d7bf8

  • SHA1

    3be8115e6b62fce5e97fbb8503604cf562593077

  • SHA256

    7480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87

  • SHA512

    ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147

  • SSDEEP

    12288:+Y/HaoayvDfkCtB15zvZElgjkqJhtU4LdNG1uRX9n32wP4+0E1DhiaOmpqCqm:+Y/HaDOvB1RxElgjv3thLy1uFlmwP4V4

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

196.251.116.149:4507

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-Z3DUGJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe
    "C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe
      "C:\Users\Admin\AppData\Local\Temp\Pharmacoposia.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\ProgramData\Remcos\remcos.exe
        "C:\ProgramData\Remcos\remcos.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2460
        • C:\ProgramData\Remcos\remcos.exe
          "C:\ProgramData\Remcos\remcos.exe"
          4⤵
            PID:2620
            • C:\Windows\SysWOW64\recover.exe
              C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\zcitpkywwrtwclgojmnqlrwlnruzp"
              5⤵
                PID:4060
              • C:\Windows\SysWOW64\recover.exe
                C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\jxnlpcjpkzlamzusswhrweqcvxeiicywk"
                5⤵
                  PID:5552
                • C:\Windows\SysWOW64\recover.exe
                  C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\uzaeq"
                  5⤵
                    PID:4124
                  • C:\Windows\SysWOW64\recover.exe
                    C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\uzaeq"
                    5⤵
                      PID:2420
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:1328
              • C:\ProgramData\Remcos\remcos.exe
                C:\ProgramData\Remcos\remcos.exe
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                PID:3516
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:5080
              • C:\ProgramData\Remcos\remcos.exe
                C:\ProgramData\Remcos\remcos.exe
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                PID:3160
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
              1⤵
                PID:2192
                • C:\ProgramData\Remcos\remcos.exe
                  C:\ProgramData\Remcos\remcos.exe
                  2⤵
                    PID:3556
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
                  1⤵
                    PID:5268
                    • C:\ProgramData\Remcos\remcos.exe
                      C:\ProgramData\Remcos\remcos.exe
                      2⤵
                        PID:5828
                        • C:\ProgramData\Remcos\remcos.exe
                          C:\ProgramData\Remcos\remcos.exe
                          3⤵
                            PID:4284

                      Network

                      MITRE ATT&CK Enterprise v16

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\Remcos\remcos.exe

                        Filesize

                        675KB

                        MD5

                        0ef8c8c1eee5fe77118d59cd697d7bf8

                        SHA1

                        3be8115e6b62fce5e97fbb8503604cf562593077

                        SHA256

                        7480374288b9c8b1c3170336fb3d17d59b7b90ca9a4e707eb693df4eb4d6cb87

                        SHA512

                        ef3a3fc62e4b9f2c34a5cbeeffdf2f942de042cfbde6a473da699d33a7116e7f81210a47765247e0e1120458adad28b508a6e6e98384586f9c02a25cbe4c8147

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        1KB

                        MD5

                        b03438ca6632d11b3ced5c88fd99795a

                        SHA1

                        5184614c57d0d93e09de47804a43e646da7252c6

                        SHA256

                        a649f25a360c5854086d6985c8b9b15a33b8182347e4ad59b081daa0bdd8b775

                        SHA512

                        d593ad74fede1dc8a9a41903ec2e3df278a61d5d743054c0b0ce9b2c32a99620b698b8ead4d0c08f18f25c6560c6ab935e3e22eb04c81b4db1f699163ced1593

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02

                        Filesize

                        471B

                        MD5

                        1d4632adbc075ecbc910f1dc1ea7aab7

                        SHA1

                        aefef0d5a36d2ccbb0269d89acd7607c185563b9

                        SHA256

                        da21852c5ec264fdf502462af387cc11b877e6df1a9cf6aa11634f084bde188f

                        SHA512

                        e024a6cc7f80cf0b70479bb3d98593f7b2ee07ecf37eaa892a828f889614cdce3a6a3cb203a02d7150b593f2f48e9bf1e80635b07f2fe6d2a7f5685f6b9fe34b

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        410B

                        MD5

                        916f806326e4f271482a1a65b9e2abd5

                        SHA1

                        aafaf9f9bac14512ffde139f74b5a8760e0b76ae

                        SHA256

                        861298643d32c5cffe60c3afa452b8cf27c8ff86f0e1ac6be294c7eb579975bc

                        SHA512

                        68d5eba2e4492a2fe17eefd1e83f6eeb3f4088e1975cd9e135403e8d1d0918d8e4db55f272f0456c6aca7a83812d685cd4e04940796fdba03e5d64c648ea28dd

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02

                        Filesize

                        402B

                        MD5

                        9765660dedd69a11377ceeda9720ddec

                        SHA1

                        8b8f137a16778ee8ca36454824cb7daeb92a4bbd

                        SHA256

                        fd8e6452e6ea7c5945f72764a7d04c7955a5821a76230b3b03e38905353616e8

                        SHA512

                        dbae50baeab87136fc1b7d3e3aa72f25a8b0d2c4c210016db58329d78f554ee5ddab612ca45f017d1e9d9462a4e643ed30332c721d6bd09a104457228724dd5b

                      • C:\Users\Admin\AppData\Local\Temp\nsa7A62.tmp\System.dll

                        Filesize

                        12KB

                        MD5

                        cff85c549d536f651d4fb8387f1976f2

                        SHA1

                        d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                        SHA256

                        8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                        SHA512

                        531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                      • C:\Users\Admin\AppData\Local\Temp\zcitpkywwrtwclgojmnqlrwlnruzp

                        Filesize

                        2B

                        MD5

                        f3b25701fe362ec84616a93a45ce9998

                        SHA1

                        d62636d8caec13f04e28442a0a6fa1afeb024bbb

                        SHA256

                        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                        SHA512

                        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Aquate\Handelsgymnasiers.dis

                        Filesize

                        343KB

                        MD5

                        92c8f4a08acfba6adf40657545e681bf

                        SHA1

                        e8bb7f5c1adf1f371066bc233b242e144e5d8fb0

                        SHA256

                        7d87a7aa53dc16dd7d85f9ee84979f3931213eb016381d5c3d5724ba8470076b

                        SHA512

                        ec192515bd39862d9052558702d9b88db2af1fc3946fa7d096efe325855da5cb78ee5e1c6afe378232afb9f3b6b7c68f9f5aeb3c8cb9b129310f54799fa910c8

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Lamper.jpg

                        Filesize

                        97KB

                        MD5

                        76aa50f1e0bcb4ed44e0da686fb1115a

                        SHA1

                        c2083f4218ab03cb5dd7e1fa12cc5b026a2b63fb

                        SHA256

                        d7e7113a11841604012fdcb8037ca28de5161a3b9ccffcb8440fba1847e128d8

                        SHA512

                        9e295d7881d9e7341f1082221bb5f5ebeee0fa9cb02c6c5ae58194037be23611e5e3a910101afa7509467445a430f459fb3c54016e2874df45781882a0498be4

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\myocardium.set

                        Filesize

                        394KB

                        MD5

                        e394eba898e6c64de87228a8e2f86480

                        SHA1

                        56d3342568f90282edcb24da3d79559316d1f181

                        SHA256

                        f2eaac6d269bf7ba5e033a525359ea1865dcb4008f8d320fa1883e90705b74f2

                        SHA512

                        bd99eaf068ac0309ddf6ebfe7862dcd33b5fbb4cb350a7f18791d984600e70978e00348a32e0e8157e8a145eb50c18dd9617684ae3f009932eacdc67ba115413

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\noncontestable.sys

                        Filesize

                        356KB

                        MD5

                        1c0e5e3fad38ad4c071145b0c91b1c75

                        SHA1

                        d4332d34c719454b251de7fea2f7ebf74e9ce59f

                        SHA256

                        c9d19087bf0a5cce7b23a791be76d2ed701b7dce69f86baefaa99e7a19fb1567

                        SHA512

                        9b71e0ac39de87e365d87df4052922d545f90e9b899b962459b9f9e5598a19a36ce247e03cc916d76feef53c5a54a6ae7bb8694e08cfa28822a522f2782a6689

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\opkast.jpg

                        Filesize

                        8KB

                        MD5

                        a798defe4bd96ce304a2b64ba9db9451

                        SHA1

                        ebe61d1bb9f882db6779e125239c94e24fa31ac8

                        SHA256

                        4c4e725a9de497a0171cb912ae1039cf782bdda0791bc15e6960c643f36282b7

                        SHA512

                        6e5b183e0fd717c7f56318f6cb8b2e273c5541d1c0205cb9af317d66a062613c9d5e08d601ed8164c6bb785349482f2406db34254bc886898a165b3608aebd69

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\Spisesalens\wineshop.ini

                        Filesize

                        616B

                        MD5

                        059cb6042549f01a636176876a196d29

                        SHA1

                        434624b61da12f82cd9dd001cf89071e289d6692

                        SHA256

                        c937269a7ddc6b76b73dd9cbd9e64b318665f2c622b00a7ab6e8d0cc31583c2c

                        SHA512

                        6fdd35b9bd2494f7a4831779cf5e55aa7620cc41c08915aca25279dc071f2016e6960c9c50a4d709a64a7b2d01234b11144e82159ad8a671535cade0c66ee208

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\blev.sic

                        Filesize

                        321KB

                        MD5

                        2bd23a1fe1db40048da512bea4500417

                        SHA1

                        983f7443e7c4c8a37cc92b06b9aefee6e6bf57b9

                        SHA256

                        f90b84e5e4fad7afcec2a9f9d29fbacde444ff121f6b1801c2dce6748fb05068

                        SHA512

                        e0ce68c81576f52643b59ac448b949617810a62f9b093073304a443d879ab671b006a58c0e50b29197bf053c4d8c01670a3b9efe0d564dd9dd85e160bd281509

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\cellarless.Hus

                        Filesize

                        25KB

                        MD5

                        831bca259fe0af3064464de13120377b

                        SHA1

                        9e8a6d534ff671ba8fc78a93d7434ac6684bee40

                        SHA256

                        7b5348bdd44c897d7299a842583ee15f35730857d37e16b20029a312eb3ef0c5

                        SHA512

                        86819548a32a72ecd60291922ccf19d0140f264dc353c42b5d3d8f45010617a700c32c511ce5e29391e134f9dd9aa016e84e33a646f121e79aaa6fc6362f28fd

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\colleens.txt

                        Filesize

                        370B

                        MD5

                        313a9633a58de00315d4b8a88456dbd4

                        SHA1

                        ac8642ba8fc5ad947be76992b388ba90c1f4f29d

                        SHA256

                        cab61979083d60310c85253bc87b5047a40869b56f1d78885f45556a809f47e8

                        SHA512

                        c274194f91eff6525d039f602bce9294ebfd805ee1382946a3f89fdf6e6c7e315ff50462c54c51a80da97de66c75e2b450d626b28ac31f391c85f9a6de1f87d1

                      • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Stabiliseringsmidlet127\fagkyndige.ini

                        Filesize

                        39B

                        MD5

                        cfc5144c3a75d5f817151ecf6e59b0f3

                        SHA1

                        324399c734ad798dd6f1eead4534f6f9e6bbdd21

                        SHA256

                        e8ec675329b6f0e7223548d4dae4fe8787e077ea654913ab4509d927ad5e0bba

                        SHA512

                        1e91beba4352d45e4a784956c4b2c7cd19f3cc38bece8aa1f0729e4a4b6f334d8b55ff1083bf42c942b7c755740adae4e316654828c4c004bc838671505b2adb

                      • memory/2364-19-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/2364-46-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2364-47-0x00007FF9E85E0000-0x00007FF9E87E9000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2364-35-0x00007FF9E85E0000-0x00007FF9E87E9000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2364-30-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2364-34-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/2364-29-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2364-20-0x00007FF9E85E0000-0x00007FF9E87E9000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2420-179-0x0000000000400000-0x0000000000424000-memory.dmp

                        Filesize

                        144KB

                      • memory/2420-182-0x0000000000400000-0x0000000000424000-memory.dmp

                        Filesize

                        144KB

                      • memory/2420-181-0x0000000000400000-0x0000000000424000-memory.dmp

                        Filesize

                        144KB

                      • memory/2620-183-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-194-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-203-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-120-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/2620-116-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-110-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/2620-184-0x0000000035A50000-0x0000000035A69000-memory.dmp

                        Filesize

                        100KB

                      • memory/2620-189-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-193-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-192-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-190-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/2620-188-0x0000000035A50000-0x0000000035A69000-memory.dmp

                        Filesize

                        100KB

                      • memory/2620-187-0x0000000035A50000-0x0000000035A69000-memory.dmp

                        Filesize

                        100KB

                      • memory/2620-200-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/4060-171-0x0000000000400000-0x000000000047D000-memory.dmp

                        Filesize

                        500KB

                      • memory/4060-170-0x0000000000400000-0x000000000047D000-memory.dmp

                        Filesize

                        500KB

                      • memory/4284-191-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/4284-195-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/4284-202-0x0000000000460000-0x0000000001777000-memory.dmp

                        Filesize

                        19.1MB

                      • memory/4284-201-0x0000000001780000-0x0000000004E2D000-memory.dmp

                        Filesize

                        54.7MB

                      • memory/5064-18-0x00007FF9E85E0000-0x00007FF9E87E9000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/5064-17-0x00007FF9E85E1000-0x00007FF9E870A000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/5552-172-0x0000000000400000-0x0000000000462000-memory.dmp

                        Filesize

                        392KB

                      • memory/5552-173-0x0000000000400000-0x0000000000462000-memory.dmp

                        Filesize

                        392KB

                      • memory/5552-174-0x0000000000400000-0x0000000000462000-memory.dmp

                        Filesize

                        392KB