Analysis
-
max time kernel
16s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
Payroll List or Salary List.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Payroll List or Salary List.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250410-en
General
-
Target
Payroll List or Salary List.exe
-
Size
683KB
-
MD5
269f0def6ce6a10c50f7e84d66a66245
-
SHA1
b6dea434a16c4450c0f15a3c2db2a8589a11dda2
-
SHA256
e6563416012431a5d2520d86517a92e9dc6e3fecd18c05ec146b3ed48015898b
-
SHA512
78adce4e78a3a9b9a641c762311c91730246d168fd76c4a8c8b46c60252bb06ff74415ea8eef186b1b4da4da82dcbfbef09fb5692f3cc36ac2e4d9fb4ba2c14e
-
SSDEEP
12288:OY/CpiGzdzUfNifQHBfxcYBJnCHYRU7sESS4L0TLmeVDr4+D7/UKz2Pl:OY/oisaNiYhf3HSsET2Nqf9/ml
Malware Config
Extracted
remcos
RemoteHost
196.251.116.218:2007
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-85JH5C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1464-178-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral1/memory/4984-188-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/4988-182-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1464-179-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/4988-182-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1464-178-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral1/memory/1464-179-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation Payroll List or Salary List.exe -
Executes dropped EXE 3 IoCs
pid Process 2532 remcos.exe 5324 remcos.exe 5312 remcos.exe -
Loads dropped DLL 4 IoCs
pid Process 968 Payroll List or Salary List.exe 968 Payroll List or Salary List.exe 2532 remcos.exe 2532 remcos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-85JH5C = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" Payroll List or Salary List.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-85JH5C = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" Payroll List or Salary List.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 17 drive.google.com 18 drive.google.com 40 drive.google.com 54 drive.google.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Objectee.ini Payroll List or Salary List.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe File opened for modification C:\Windows\SysWOW64\Objectee.ini remcos.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5952 Payroll List or Salary List.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 968 Payroll List or Salary List.exe 5952 Payroll List or Salary List.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin remcos.exe File opened for modification C:\Windows\resources\0409\otto\asynchronisms.bin Payroll List or Salary List.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payroll List or Salary List.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payroll List or Salary List.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 968 Payroll List or Salary List.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 968 wrote to memory of 5952 968 Payroll List or Salary List.exe 91 PID 968 wrote to memory of 5952 968 Payroll List or Salary List.exe 91 PID 968 wrote to memory of 5952 968 Payroll List or Salary List.exe 91 PID 968 wrote to memory of 5952 968 Payroll List or Salary List.exe 91 PID 3344 wrote to memory of 2532 3344 cmd.exe 99 PID 3344 wrote to memory of 2532 3344 cmd.exe 99 PID 3344 wrote to memory of 2532 3344 cmd.exe 99 PID 5952 wrote to memory of 5324 5952 Payroll List or Salary List.exe 100 PID 5952 wrote to memory of 5324 5952 Payroll List or Salary List.exe 100 PID 5952 wrote to memory of 5324 5952 Payroll List or Salary List.exe 100 PID 3636 wrote to memory of 5312 3636 cmd.exe 101 PID 3636 wrote to memory of 5312 3636 cmd.exe 101 PID 3636 wrote to memory of 5312 3636 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payroll List or Salary List.exe"C:\Users\Admin\AppData\Local\Temp\Payroll List or Salary List.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Payroll List or Salary List.exe"C:\Users\Admin\AppData\Local\Temp\Payroll List or Salary List.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:2092
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\bnfctvxxfzksymgr"4⤵PID:1188
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\bnfctvxxfzksymgr"4⤵PID:1464
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\dhtntoizbhcfbscdgzn"4⤵PID:4988
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\obyfugbsppuklyqhxkipqwx"4⤵PID:4984
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:1420
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:2192
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe3⤵PID:2460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"1⤵PID:1156
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe2⤵PID:2012
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
683KB
MD5269f0def6ce6a10c50f7e84d66a66245
SHA1b6dea434a16c4450c0f15a3c2db2a8589a11dda2
SHA256e6563416012431a5d2520d86517a92e9dc6e3fecd18c05ec146b3ed48015898b
SHA51278adce4e78a3a9b9a641c762311c91730246d168fd76c4a8c8b46c60252bb06ff74415ea8eef186b1b4da4da82dcbfbef09fb5692f3cc36ac2e4d9fb4ba2c14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5517b42c897481d3ef87c7d3590dc4556
SHA152db14d62d6e762bf4ee6458d4e562abffe66dd1
SHA2568b03de3b33087141fa82c1e1cd7e6c704a47d755316c62cbaa63b5eb84192af5
SHA51286c0d25d1825b6dbf3b415ec3e5ce87a55177bf9c9e6ff176dd98b8a44fe9082ae457d2b8c01c4f24c0e1e530c99307bce3c5600f1d1c9964e24551d99175b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize471B
MD51d4632adbc075ecbc910f1dc1ea7aab7
SHA1aefef0d5a36d2ccbb0269d89acd7607c185563b9
SHA256da21852c5ec264fdf502462af387cc11b877e6df1a9cf6aa11634f084bde188f
SHA512e024a6cc7f80cf0b70479bb3d98593f7b2ee07ecf37eaa892a828f889614cdce3a6a3cb203a02d7150b593f2f48e9bf1e80635b07f2fe6d2a7f5685f6b9fe34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C
Filesize471B
MD51682d9a317fb0ef78c8f96dc125f7c39
SHA1774f79aa6262843fe9a4a54b978c66d485d18a05
SHA25697f950c9a3dfd9f27b81d1c77f10e0f1788384bb25fb76d94fcbf94a80525988
SHA5125dccd2aa4eda7edb42e133e6a1d45bba89f9a12add0d4e867fc07a03c819c28ffd89f8b56213b4eb9580cc944f9d1ac05757ed93ecb68a3343e0d060ddfd3bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5825c7fdcee21170122b23ccd30cc4210
SHA10a6b00a9d59d39e3c624508f98072f9e01a83ecd
SHA256d7940c40af24136da1fd725a4bd6e43563681de67bb83f8ebd059f4185d359cc
SHA5120c1e7b866b19b4af720e7542935eb26c9f8b0ab2ad612086739e5175ca47c5c606d531b74fdadc69e9adbeb978cd45e26be2838fa5d49690b68dbdf31cee2f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02
Filesize402B
MD522f28a0012ce772f311ac6ed0468ca40
SHA1026e48e0211c392afcf4e204cd0087f958f157d5
SHA2568457119da390fbd3cce13dd38db4f5c29c86ecea6ff12a75f63ed67f1f0bdf25
SHA5124df58ab7e84c4d2d5a3b42bbda332189d5fed04c3cb7bc7cdb0b8e65c8287694c3c1eabfc1af2365b0e644377029096d2a6619c73ca71e22ecf4bfa2c253f8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C
Filesize406B
MD5f5ce0f9bc6c1f49b45fe10025eab1b30
SHA1c221d4ccce7db863f1e6a7e63e19914275b5ba57
SHA2561ff2e264e69b44cb641446059c6e361bdfdb6eb57a6ba0925709a3e3568a7119
SHA512d34f2df3077b2383838eb11f794e0a05ec2a52bf7fa3e6ec06151246529fb8343e9a0e73e136e2b3528fd9962b1f0afd0ef8ee9b9e5ed4f90123d76f7f1c851d
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
312KB
MD5de89e9a8ab72b9d958dcada9010dff47
SHA1cc4146145c5c8bde75ca65edf3fa12e01dc40299
SHA2562a838399586680d5ced2ab7a8ee8f12f1eba8af0099c4083b027df7a757e975b
SHA512bf52ef11197b84485cf308b15523168a7b6c3090e2d0eda5402f33eceb9cf317dc6dbcd4baa0b37744ffb6697d0c6ff5647c8aa7056c2736cf00b22f96390a07
-
Filesize
97KB
MD576aa50f1e0bcb4ed44e0da686fb1115a
SHA1c2083f4218ab03cb5dd7e1fa12cc5b026a2b63fb
SHA256d7e7113a11841604012fdcb8037ca28de5161a3b9ccffcb8440fba1847e128d8
SHA5129e295d7881d9e7341f1082221bb5f5ebeee0fa9cb02c6c5ae58194037be23611e5e3a910101afa7509467445a430f459fb3c54016e2874df45781882a0498be4
-
Filesize
92KB
MD5fb747707354f75cb2bd552556b0c1d42
SHA10c09a1ccce40052659bdf310569245356dc6bbb9
SHA256d7942e26ad71cccb0e61188868aee592a2e203cbe93810fcd36f7c8bca257a34
SHA512743244f863cdcc8ad36a020fce5f0948f19fcd7f522091e2342115f60ee945ab85bca907cddd07acc0a0116d564e3a113cb6a925cd98c645a37f108225127e9a
-
Filesize
394KB
MD5e394eba898e6c64de87228a8e2f86480
SHA156d3342568f90282edcb24da3d79559316d1f181
SHA256f2eaac6d269bf7ba5e033a525359ea1865dcb4008f8d320fa1883e90705b74f2
SHA512bd99eaf068ac0309ddf6ebfe7862dcd33b5fbb4cb350a7f18791d984600e70978e00348a32e0e8157e8a145eb50c18dd9617684ae3f009932eacdc67ba115413
-
Filesize
370B
MD5313a9633a58de00315d4b8a88456dbd4
SHA1ac8642ba8fc5ad947be76992b388ba90c1f4f29d
SHA256cab61979083d60310c85253bc87b5047a40869b56f1d78885f45556a809f47e8
SHA512c274194f91eff6525d039f602bce9294ebfd805ee1382946a3f89fdf6e6c7e315ff50462c54c51a80da97de66c75e2b450d626b28ac31f391c85f9a6de1f87d1
-
Filesize
39B
MD5cfc5144c3a75d5f817151ecf6e59b0f3
SHA1324399c734ad798dd6f1eead4534f6f9e6bbdd21
SHA256e8ec675329b6f0e7223548d4dae4fe8787e077ea654913ab4509d927ad5e0bba
SHA5121e91beba4352d45e4a784956c4b2c7cd19f3cc38bece8aa1f0729e4a4b6f334d8b55ff1083bf42c942b7c755740adae4e316654828c4c004bc838671505b2adb
-
Filesize
321KB
MD52bd23a1fe1db40048da512bea4500417
SHA1983f7443e7c4c8a37cc92b06b9aefee6e6bf57b9
SHA256f90b84e5e4fad7afcec2a9f9d29fbacde444ff121f6b1801c2dce6748fb05068
SHA512e0ce68c81576f52643b59ac448b949617810a62f9b093073304a443d879ab671b006a58c0e50b29197bf053c4d8c01670a3b9efe0d564dd9dd85e160bd281509
-
Filesize
356KB
MD51c0e5e3fad38ad4c071145b0c91b1c75
SHA1d4332d34c719454b251de7fea2f7ebf74e9ce59f
SHA256c9d19087bf0a5cce7b23a791be76d2ed701b7dce69f86baefaa99e7a19fb1567
SHA5129b71e0ac39de87e365d87df4052922d545f90e9b899b962459b9f9e5598a19a36ce247e03cc916d76feef53c5a54a6ae7bb8694e08cfa28822a522f2782a6689
-
Filesize
192KB
MD503f23b0e067c578c58ab43ef5ed7233f
SHA12b95f57b3d5ca072c104210b6c8357b7f90e3a5f
SHA256ef65bf3eb90881a21207cd852242ca527a74b412dc7d5bbe33de987af320767d
SHA512eec479e3fefc85d191a7f9bb8684eb74f58c03d743953b430f0cd88654f420b3ba300e4f57206dd01f858b939a79747dd20c2a36fdba1b2a788877104981dd38
-
Filesize
8KB
MD5a798defe4bd96ce304a2b64ba9db9451
SHA1ebe61d1bb9f882db6779e125239c94e24fa31ac8
SHA2564c4e725a9de497a0171cb912ae1039cf782bdda0791bc15e6960c643f36282b7
SHA5126e5b183e0fd717c7f56318f6cb8b2e273c5541d1c0205cb9af317d66a062613c9d5e08d601ed8164c6bb785349482f2406db34254bc886898a165b3608aebd69
-
Filesize
616B
MD5059cb6042549f01a636176876a196d29
SHA1434624b61da12f82cd9dd001cf89071e289d6692
SHA256c937269a7ddc6b76b73dd9cbd9e64b318665f2c622b00a7ab6e8d0cc31583c2c
SHA5126fdd35b9bd2494f7a4831779cf5e55aa7620cc41c08915aca25279dc071f2016e6960c9c50a4d709a64a7b2d01234b11144e82159ad8a671535cade0c66ee208