Edit tour
Windows
Analysis Report
17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
Overview
General Information
Sample name: | 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe |
Analysis ID: | 1569786 |
MD5: | 7f2ebe83b860a8de1f3ce798c79b5935 |
SHA1: | 3fbea97a5aa637271311851fd152ee37e813c44f |
SHA256: | fd125d03b2bc8512a9a5dcc6df9ca5045208442bc047af50b5f0a359103c1ba8 |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Detection
Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 6568 cmdline:
"C:\Users\ user\Deskt op\1733475 2451c3a431 89360a7e5b 86f13b5ea7 a604430425 6a8f4c49ad 5d5bd4831e 72ee12e792 .dat-decod ed.exe" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 6192 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\qvs nmq" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 6276 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\wfg mexfquvwjo rmwxnmvqsf nckapqyps" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 6020 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\xjr vqnzhyavnh pgfptkxogg co" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 6072 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\atk wdxhfhaecr erwdsjtdar otoqimtmgd h" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 2668 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\azr bouitfbtqk nwrahjxuee uvbutbfjrm v" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935) - 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe (PID: 5184 cmdline:
C:\Users\u ser\Deskto p\17334752 451c3a4318 9360a7e5b8 6f13b5ea7a 6044304256 a8f4c49ad5 d5bd4831e7 2ee12e792. dat-decode d.exe /ste xt "C:\Use rs\user\Ap pData\Loca l\Temp\xmd ugchyslpaa sitdca" MD5: 7F2EBE83B860A8DE1F3CE798C79B5935)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["jawa123.duckdns.org:9005:1"], "Assigned name": "HOME", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "vlc.exe", "Startup value": "chorne", "Hide file": "Disable", "Mutex": "net-YA1YXM", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "vlc", "Keylog folder": "remcos", "Keylog file max size": "100"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer | detects Windows exceutables potentially bypassing UAC using eventvwr.exe | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Click to see the 48 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer | detects Windows exceutables potentially bypassing UAC using eventvwr.exe | ditekSHen |
| |
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Click to see the 23 entries |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-06T10:07:13.372160+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:08:43.186058+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49809 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:08:43.530013+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49811 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:08:57.389539+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49844 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:09:08.389525+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49870 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:09:28.842942+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49915 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:09:33.139924+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49925 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:11:18.422682+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50010 | 154.216.20.244 | 9005 | TCP |
2024-12-06T10:11:18.625669+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50011 | 154.216.20.244 | 9005 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-06T10:07:16.004490+0100 | 2803304 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 178.237.33.50 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 5_2_00404423 |
Source: | Binary or memory string: | memstr_15ef2a8b-9 |
Source: | Static PE information: |
Source: | Code function: | 5_2_0040AE51 | |
Source: | Code function: | 6_2_00407C87 | |
Source: | Code function: | 7_2_00407898 | |
Source: | Code function: | 10_2_00407898 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: |