Loading ...

Play interactive tourEdit tour

Windows Analysis Report PI#EB01122021.exe

Overview

General Information

Sample Name:PI#EB01122021.exe
Analysis ID:533085
MD5:a6d5cd1e1ff086014a001bbed0d94c42
SHA1:bcd4ca105885e8c636603002108ec7988b08e406
SHA256:68bcb49a4f5f2491ef6606a57d1713362478e18edc2197c5daeaf1e887533999
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Detected Remcos RAT
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: Suspicious Script Execution From Temp Folder
Contains functionality to steal Firefox passwords or cookies
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Contains functionality to inject code into remote processes
Deletes itself after installation
Sigma detected: WScript or CScript Dropper
Installs a global keyboard hook
Injects files into Windows application
Delayed program exit found
Contains functionality to steal Chrome passwords or cookies
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Drops PE files
Contains functionality to read the PEB
Binary contains a suspicious time stamp
Contains functionality to retrieve information about pressed keystrokes
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Detected TCP or UDP traffic on non-standard ports
Contains functionality to download and launch executables
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to simulate mouse events
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64
  • PI#EB01122021.exe (PID: 6884 cmdline: "C:\Users\user\Desktop\PI#EB01122021.exe" MD5: A6D5CD1E1FF086014A001BBED0D94C42)
    • PI#EB01122021.exe (PID: 7064 cmdline: C:\Users\user\Desktop\PI#EB01122021.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
      • wscript.exe (PID: 1444 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" MD5: 7075DD7B9BE8807FCA93ACD86F724884)
        • cmd.exe (PID: 5976 cmdline: C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 5252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • notepad.exe (PID: 5492 cmdline: C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
            • notepad.exe (PID: 6436 cmdline: C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
  • notepad.exe (PID: 5156 cmdline: "C:\Users\user\AppData\Roaming\Remcos\notepad.exe" MD5: A6D5CD1E1FF086014A001BBED0D94C42)
    • notepad.exe (PID: 6512 cmdline: C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
  • notepad.exe (PID: 6532 cmdline: "C:\Users\user\AppData\Roaming\Remcos\notepad.exe" MD5: A6D5CD1E1FF086014A001BBED0D94C42)
    • notepad.exe (PID: 6660 cmdline: C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
  • notepad.exe (PID: 6952 cmdline: "C:\Users\user\AppData\Roaming\Remcos\notepad.exe" MD5: A6D5CD1E1FF086014A001BBED0D94C42)
    • notepad.exe (PID: 7160 cmdline: C:\Users\user\AppData\Roaming\Remcos\notepad.exe MD5: A6D5CD1E1FF086014A001BBED0D94C42)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "79.134.225.119:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "notepad.exe", "Startup value": "notepad", "Hide file": "Disable", "Mutex": "Remcos-GWVBZH", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Enable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100000"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmpREMCOS_RAT_variantsunknownunknown
      • 0x61744:$str_a1: C:\Windows\System32\cmd.exe
      • 0x616c0:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x616c0:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x60ca8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x61300:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x608ec:$str_b2: Executing file:
      • 0x61888:$str_b3: GetDirectListeningPort
      • 0x610c0:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x612e8:$str_b7: \update.vbs
      • 0x6093c:$str_b9: Downloaded file:
      • 0x60928:$str_b10: Downloading file:
      • 0x60910:$str_b12: Failed to upload file:
      • 0x61850:$str_b13: StartForward
      • 0x61870:$str_b14: StopForward
      • 0x61290:$str_b15: fso.DeleteFile "
      • 0x61224:$str_b16: On Error Resume Next
      • 0x612c0:$str_b17: fso.DeleteFolder "
      • 0x60900:$str_b18: Uploaded file:
      • 0x6097c:$str_b19: Unable to delete:
      • 0x61258:$str_b20: while fso.FileExists("
      • 0x60de1:$str_c0: [Firefox StoredLogins not found]
      00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x61744:$str_a1: C:\Windows\System32\cmd.exe
        • 0x616c0:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x616c0:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x60ca8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x61300:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x608ec:$str_b2: Executing file:
        • 0x61888:$str_b3: GetDirectListeningPort
        • 0x610c0:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x612e8:$str_b7: \update.vbs
        • 0x6093c:$str_b9: Downloaded file:
        • 0x60928:$str_b10: Downloading file:
        • 0x60910:$str_b12: Failed to upload file:
        • 0x61850:$str_b13: StartForward
        • 0x61870:$str_b14: StopForward
        • 0x61290:$str_b15: fso.DeleteFile "
        • 0x61224:$str_b16: On Error Resume Next
        • 0x612c0:$str_b17: fso.DeleteFolder "
        • 0x60900:$str_b18: Uploaded file:
        • 0x6097c:$str_b19: Unable to delete:
        • 0x61258:$str_b20: while fso.FileExists("
        • 0x60de1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 105 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        17.2.notepad.exe.2be1c00.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          12.0.notepad.exe.400000.6.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            12.0.notepad.exe.400000.6.unpackREMCOS_RAT_variantsunknownunknown
            • 0x60744:$str_a1: C:\Windows\System32\cmd.exe
            • 0x606c0:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x606c0:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x5fca8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x60300:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x5f8ec:$str_b2: Executing file:
            • 0x60888:$str_b3: GetDirectListeningPort
            • 0x600c0:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x602e8:$str_b7: \update.vbs
            • 0x5f93c:$str_b9: Downloaded file:
            • 0x5f928:$str_b10: Downloading file:
            • 0x5f910:$str_b12: Failed to upload file:
            • 0x60850:$str_b13: StartForward
            • 0x60870:$str_b14: StopForward
            • 0x60290:$str_b15: fso.DeleteFile "
            • 0x60224:$str_b16: On Error Resume Next
            • 0x602c0:$str_b17: fso.DeleteFolder "
            • 0x5f900:$str_b18: Uploaded file:
            • 0x5f97c:$str_b19: Unable to delete:
            • 0x60258:$str_b20: while fso.FileExists("
            • 0x5fde1:$str_c0: [Firefox StoredLogins not found]
            9.2.notepad.exe.3e88ef0.3.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              9.2.notepad.exe.3e88ef0.3.unpackREMCOS_RAT_variantsunknownunknown
              • 0x5f744:$str_a1: C:\Windows\System32\cmd.exe
              • 0x5f6c0:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x5f6c0:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x5eca8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x5f300:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x5e8ec:$str_b2: Executing file:
              • 0x5f888:$str_b3: GetDirectListeningPort
              • 0x5f0c0:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x5f2e8:$str_b7: \update.vbs
              • 0x5e93c:$str_b9: Downloaded file:
              • 0x5e928:$str_b10: Downloading file:
              • 0x5e910:$str_b12: Failed to upload file:
              • 0x5f850:$str_b13: StartForward
              • 0x5f870:$str_b14: StopForward
              • 0x5f290:$str_b15: fso.DeleteFile "
              • 0x5f224:$str_b16: On Error Resume Next
              • 0x5f2c0:$str_b17: fso.DeleteFolder "
              • 0x5e900:$str_b18: Uploaded file:
              • 0x5e97c:$str_b19: Unable to delete:
              • 0x5f258:$str_b20: while fso.FileExists("
              • 0x5ede1:$str_c0: [Firefox StoredLogins not found]
              Click to see the 220 entries

              Sigma Overview

              System Summary:

              barindex
              Sigma detected: Suspicious Script Execution From Temp FolderShow sources
              Source: Process startedAuthor: Florian Roth, Max Altgelt: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Users\user\Desktop\PI#EB01122021.exe, ParentImage: C:\Users\user\Desktop\PI#EB01122021.exe, ParentProcessId: 7064, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 1444
              Sigma detected: WScript or CScript DropperShow sources
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (rule), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: C:\Users\user\Desktop\PI#EB01122021.exe, ParentImage: C:\Users\user\Desktop\PI#EB01122021.exe, ParentProcessId: 7064, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs" , ProcessId: 1444

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "79.134.225.119:2404:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "notepad.exe", "Startup value": "notepad", "Hide file": "Disable", "Mutex": "Remcos-GWVBZH", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Enable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100000"}
              Multi AV Scanner detection for submitted fileShow sources
              Source: PI#EB01122021.exeReversingLabs: Detection: 24%
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4199000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3e89000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3749000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3c99000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.40f9000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710552942.00000000010F7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.674208538.0000000000FB7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750930266.0000000000A37000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729849603.0000000001027000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 6884, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 7064, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5492, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6532, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 7160, type: MEMORYSTR
              Multi AV Scanner detection for domain / URLShow sources
              Source: 79.134.225.119Virustotal: Detection: 6%Perma Link
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeReversingLabs: Detection: 24%
              Machine Learning detection for sampleShow sources
              Source: PI#EB01122021.exeJoe Sandbox ML: detected
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0042F31F CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0042F31F CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
              Source: PI#EB01122021.exe, 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----
              Source: PI#EB01122021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: PI#EB01122021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00406AEE SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040A047 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00418144 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040A262 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00406360 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040783D __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00407C95 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00447D49 FindFirstFileExA,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00415DC8 FindFirstFileW,FindNextFileW,FindNextFileW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040A047 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00418144 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040A262 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00406360 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040783D __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00407C95 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00447D49 FindFirstFileExA,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00415DC8 FindFirstFileW,FindNextFileW,FindNextFileW,

              Networking:

              barindex
              System process connects to network (likely due to code injection or exploit)Show sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeNetwork Connect: 79.134.225.119 2404
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: 79.134.225.119
              Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
              Source: Joe Sandbox ViewIP Address: 79.134.225.119 79.134.225.119
              Source: global trafficTCP traffic: 192.168.2.4:49766 -> 79.134.225.119:2404
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00413468 Sleep,URLDownloadToFileW,
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.119

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Installs a global keyboard hookShow sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004089F0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00413718 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00413718 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,

              E-Banking Fraud:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4199000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3e89000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3749000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3c99000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.40f9000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710552942.00000000010F7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.674208538.0000000000FB7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750930266.0000000000A37000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729849603.0000000001027000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 6884, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 7064, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5492, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6532, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 7160, type: MEMORYSTR

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 1_2_00A3C694
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 1_2_00A3EAC8
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 1_2_00A3EAD8
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00423115
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00411234
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004323C0
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043538A
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0042F42A
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043B56C
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0041B537
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00434641
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0042360C
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0044C7FB
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043B79B
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004357BF
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00452880
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043191B
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043B9CA
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0044E981
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00434B3D
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00423CAA
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00440D30
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00423DED
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00434F55
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0044CF19
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00419F80
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 9_2_0287C694
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 9_2_0287EAC8
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 9_2_0287EAD8
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00423115
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00411234
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_004323C0
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043538A
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0042F42A
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043B56C
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0041B537
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00434641
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0042360C
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0044C7FB
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043B79B
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_004357BF
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00452880
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043191B
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043B9CA
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0044E981
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00434B3D
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00423CAA
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00440D30
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00423DED
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00434F55
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0044CF19
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00419F80
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_02CBC694
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_02CBEAC8
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_02CBEAD8
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_053EEFB8
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_053EEFF0
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_053EEFE2
              Source: PI#EB01122021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              Source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0041360B ExitWindowsEx,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0041360B ExitWindowsEx,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: String function: 004308A0 appears 53 times
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: String function: 004301F3 appears 37 times
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: String function: 00402076 appears 50 times
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: String function: 004308A0 appears 53 times
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: String function: 004301F3 appears 37 times
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: String function: 00402076 appears 50 times
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00414B29 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00414B29 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
              Source: PI#EB01122021.exeBinary or memory string: OriginalFilename vs PI#EB01122021.exe
              Source: PI#EB01122021.exe, 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PI#EB01122021.exe
              Source: PI#EB01122021.exe, 00000001.00000002.670529475.0000000002481000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs PI#EB01122021.exe
              Source: PI#EB01122021.exe, 00000001.00000002.672873261.0000000005550000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs PI#EB01122021.exe
              Source: PI#EB01122021.exeBinary or memory string: OriginalFilename vs PI#EB01122021.exe
              Source: PI#EB01122021.exeBinary or memory string: OriginalFilenameAssemblyTargetedPatchBandAttribu.exe4 vs PI#EB01122021.exe
              Source: PI#EB01122021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: notepad.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: PI#EB01122021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI#EB01122021.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/6@0/1
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00416D71 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00417629 FindResourceA,LoadResource,LockResource,SizeofResource,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
              Source: PI#EB01122021.exeReversingLabs: Detection: 24%
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile read: C:\Users\user\Desktop\PI#EB01122021.exeJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\PI#EB01122021.exe "C:\Users\user\Desktop\PI#EB01122021.exe"
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Users\user\Desktop\PI#EB01122021.exe C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Users\user\Desktop\PI#EB01122021.exe C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00414367 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00414367 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile created: C:\Users\user\AppData\Local\Temp\install.vbsJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040D25B CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeMutant created: \Sessions\1\BaseNamedObjects\Remcos-GWVBZH
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5252:120:WilError_01
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: PI#EB01122021.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: PI#EB01122021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: PI#EB01122021.exe, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.0.PI#EB01122021.exe.50000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.2.PI#EB01122021.exe.50000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: notepad.exe.4.dr, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.19.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.17.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.2.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.7.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.3.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.15.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.5.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.21.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.PI#EB01122021.exe.ae0000.1.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.1.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.11.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.9.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.PI#EB01122021.exe.ae0000.13.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 9.0.notepad.exe.6d0000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 9.2.notepad.exe.6d0000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.13.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.17.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.19.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.0.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.2.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.7.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.9.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.2.notepad.exe.ca0000.1.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 10.0.notepad.exe.ca0000.21.unpack, wG/wr.cs.Net Code: fQX System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00452248 push eax; ret
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004594BD push esi; ret
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004308E6 push ecx; ret
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00451926 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00452248 push eax; ret
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_004594BD push esi; ret
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_004308E6 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00451926 push ecx; ret
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00CA9C80 push esi; retf
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 11_2_053EFF04 push E802005Eh; ret
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040CD53 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: PI#EB01122021.exeStatic PE information: 0x9E2F5619 [Thu Feb 5 11:06:01 2054 UTC]
              Source: initial sampleStatic PE information: section name: .text entropy: 7.90145393477
              Source: initial sampleStatic PE information: section name: .text entropy: 7.90145393477
              Source: C:\Users\user\Desktop\PI#EB01122021.exeFile created: C:\Users\user\AppData\Roaming\Remcos\notepad.exeJump to dropped file
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00405E28 ShellExecuteW,URLDownloadToFileW,

              Boot Survival:

              barindex
              Creates an undocumented autostart registry key Show sources
              Source: C:\Users\user\Desktop\PI#EB01122021.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run notepadJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run notepadJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run notepadJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00416D71 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Deletes itself after installationShow sources
              Source: C:\Windows\SysWOW64\wscript.exeFile deleted: c:\users\user\desktop\pi#eb01122021.exeJump to behavior
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040CD53 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM3Show sources
              Source: Yara matchFile source: 17.2.notepad.exe.2be1c00.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.2ef1c00.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.29f1c00.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.24a1bc8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.2e51c00.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000E.00000002.735784569.0000000002ED1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.670529475.0000000002481000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.700890125.00000000029D1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.711320797.0000000002E31000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 6884, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5492, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6532, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6952, type: MEMORYSTR
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: PI#EB01122021.exe, 00000001.00000002.670529475.0000000002481000.00000004.00000001.sdmp, notepad.exe, 00000009.00000002.700890125.00000000029D1000.00000004.00000001.sdmp, notepad.exe, 0000000B.00000002.711320797.0000000002E31000.00000004.00000001.sdmp, notepad.exe, 0000000E.00000002.735784569.0000000002ED1000.00000004.00000001.sdmp, notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: PI#EB01122021.exe, 00000001.00000002.670529475.0000000002481000.00000004.00000001.sdmp, notepad.exe, 00000009.00000002.700890125.00000000029D1000.00000004.00000001.sdmp, notepad.exe, 0000000B.00000002.711320797.0000000002E31000.00000004.00000001.sdmp, notepad.exe, 0000000E.00000002.735784569.0000000002ED1000.00000004.00000001.sdmp, notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Delayed program exit foundShow sources
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040D0FF Sleep,ExitProcess,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040D0FF Sleep,ExitProcess,
              Source: C:\Users\user\Desktop\PI#EB01122021.exe TID: 6888Thread sleep time: -40793s >= -30000s
              Source: C:\Users\user\Desktop\PI#EB01122021.exe TID: 6960Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 5484Thread sleep time: -40924s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 4780Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 6112Thread sleep count: 66 > 30
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 6112Thread sleep time: -33000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 5360Thread sleep time: -39753s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 5400Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 6536Thread sleep time: -38530s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 6848Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 6948Thread sleep time: -37033s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exe TID: 7048Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
              Source: C:\Users\user\Desktop\PI#EB01122021.exeThread delayed: delay time: 40793
              Source: C:\Users\user\Desktop\PI#EB01122021.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 40924
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 39753
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 38530
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 37033
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00406AEE SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,
              Source: notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
              Source: notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: notepad.exe, 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040A047 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00418144 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040A262 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00406360 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040783D __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00407C95 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00447D49 FindFirstFileExA,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00415DC8 FindFirstFileW,FindNextFileW,FindNextFileW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040A047 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00418144 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040A262 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00406360 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0040783D __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00407C95 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00447D49 FindFirstFileExA,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00415DC8 FindFirstFileW,FindNextFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0040CD53 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043DE2E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043DE2E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043047C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0044901D GetProcessHeap,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043047C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043753F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0043060E SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00430A6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043047C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043753F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_0043060E SetUnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: 10_2_00430A6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              System process connects to network (likely due to code injection or exploit)Show sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeNetwork Connect: 79.134.225.119 2404
              Contains functionality to inject code into remote processesShow sources
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00414B29 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
              Injects files into Windows applicationShow sources
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeInjected file: C:\Users\user\AppData\Roaming\Remcos\notepad.exe was created by C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Users\user\Desktop\PI#EB01122021.exe C:\Users\user\Desktop\PI#EB01122021.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeProcess created: C:\Users\user\AppData\Roaming\Remcos\notepad.exe C:\Users\user\AppData\Roaming\Remcos\notepad.exe
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00415968 StrToIntA,mouse_event,
              Source: notepad.exe, 0000000A.00000002.923716071.0000000001990000.00000002.00020000.sdmpBinary or memory string: Program Manager
              Source: notepad.exe, 0000000A.00000002.923716071.0000000001990000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
              Source: notepad.exe, 0000000A.00000002.923716071.0000000001990000.00000002.00020000.sdmpBinary or memory string: Progman
              Source: notepad.exe, 0000000A.00000002.923716071.0000000001990000.00000002.00020000.sdmpBinary or memory string: Progmanlock
              Source: logs.dat.10.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Users\user\Desktop\PI#EB01122021.exe VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Users\user\AppData\Roaming\Remcos\notepad.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Users\user\AppData\Roaming\Remcos\notepad.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Users\user\AppData\Roaming\Remcos\notepad.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Users\user\AppData\Roaming\Remcos\notepad.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004306EC cpuid
              Source: C:\Users\user\Desktop\PI#EB01122021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_00405038 GetLocalTime,CreateEventA,CreateThread,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_004440B8 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: 4_2_0041778E GetComputerNameExW,GetUserNameW,

              Stealing of Sensitive Information:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4199000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3e89000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3749000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3c99000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.40f9000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710552942.00000000010F7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.674208538.0000000000FB7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750930266.0000000000A37000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729849603.0000000001027000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 6884, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 7064, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5492, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6532, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 7160, type: MEMORYSTR
              Contains functionality to steal Firefox passwords or cookiesShow sources
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: \key3.db
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: \key3.db
              Contains functionality to steal Chrome passwords or cookiesShow sources
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data

              Remote Access Functionality:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 12.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.42e8ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4199000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3e88ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3938ef0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.notepad.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.4388ef0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.16.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.notepad.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.16.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.20.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.notepad.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.0.notepad.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 10.0.notepad.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.notepad.exe.400000.18.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3e89000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3749000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.4078ef0.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.PI#EB01122021.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.PI#EB01122021.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.3c99000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.40f9000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.notepad.exe.3ed9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.notepad.exe.3e39930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.PI#EB01122021.exe.3489930.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.notepad.exe.39d9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.notepad.exe.3bc9930.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710552942.00000000010F7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.674208538.0000000000FB7000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.750930266.0000000000A37000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.729849603.0000000001027000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 6884, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PI#EB01122021.exe PID: 7064, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5492, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6436, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 5156, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6532, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6660, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 6952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: notepad.exe PID: 7160, type: MEMORYSTR
              Detected Remcos RATShow sources
              Source: PI#EB01122021.exe, 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: PI#EB01122021.exe, 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: PI#EB01122021.exeString found in binary or memory: Remcos_Mutex_Inj
              Source: PI#EB01122021.exe, 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: PI#EB01122021.exe, 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: PI#EB01122021.exe, 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: PI#EB01122021.exe, 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: PI#EB01122021.exe, 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: PI#EB01122021.exe, 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exeString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: notepad.exe, 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: notepad.exe, 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmpString found in binary or memory: fso.DeleteFolder "\update.vbsCreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)Unknown exceptionbad castbad locale name: genericiostreamiostream stream errorios_base::badbit setios_base::failbit setios_base::eofbit setlicense_code.txtSoftware\ExeWDRemcos_Mutex_InjInjProductName (64 bit) (32 bit)licenceRemcos Agent initializedUserAccess Level: AdministratorGetModuleFileNameExAPsapi.dllKernel32.dllGetModuleFileNameExWNtUnmapViewOfSectionntdll.dllGlobalMemoryStatusExkernel32.dllIsWow64Processkernel32GetComputerNameExWIsUserAnAdminShell32SetProcessDEPPolicyEnumDisplayDevicesWuser32EnumDisplayMonitorsGetMonitorInfoWShlwapi.dll1Program Files\Program Files (x86)\overridepth_unenc3.3.2 Prov|
              Source: C:\Users\user\Desktop\PI#EB01122021.exeCode function: cmd.exe
              Source: C:\Users\user\AppData\Roaming\Remcos\notepad.exeCode function: cmd.exe

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsScripting11Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsNative API1Windows Service1Access Token Manipulation1Deobfuscate/Decode Files or Information1Input Capture111Account Discovery1Remote Desktop ProtocolInput Capture111Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsShared Modules1Registry Run Keys / Startup Folder11Windows Service1Scripting11Credentials In Files2System Service Discovery1SMB/Windows Admin SharesClipboard Data2Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsCommand and Scripting Interpreter1Logon Script (Mac)Process Injection322Obfuscated Files or Information3NTDSFile and Directory Discovery3Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
              Cloud AccountsService Execution2Network Logon ScriptRegistry Run Keys / Startup Folder11Software Packing12LSA SecretsSystem Information Discovery33SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsQuery Registry1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsFile Deletion1DCSyncSecurity Software Discovery221Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobMasquerading1Proc FilesystemVirtualization/Sandbox Evasion21Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Virtualization/Sandbox Evasion21/etc/passwd and /etc/shadowProcess Discovery2Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Access Token Manipulation1Network SniffingSystem Owner/User Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronProcess Injection322Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 533085 Sample: PI#EB01122021.exe Startdate: 03/12/2021 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 10 other signatures 2->63 10 PI#EB01122021.exe 3 2->10         started        14 notepad.exe 2 2->14         started        16 notepad.exe 2 2->16         started        18 notepad.exe 2 2->18         started        process3 file4 53 C:\Users\user\...\PI#EB01122021.exe.log, ASCII 10->53 dropped 79 Contains functionality to steal Chrome passwords or cookies 10->79 81 Contains functionality to inject code into remote processes 10->81 83 Contains functionality to steal Firefox passwords or cookies 10->83 85 Delayed program exit found 10->85 20 PI#EB01122021.exe 6 5 10->20         started        87 Injects files into Windows application 14->87 24 notepad.exe 14->24         started        26 notepad.exe 16->26         started        28 notepad.exe 18->28         started        signatures5 process6 file7 47 C:\Users\user\AppData\Roaming\...\notepad.exe, PE32 20->47 dropped 49 C:\Users\user\...\notepad.exe:Zone.Identifier, ASCII 20->49 dropped 51 C:\Users\user\AppData\Local\...\install.vbs, data 20->51 dropped 73 Creates an undocumented autostart registry key 20->73 30 wscript.exe 1 20->30         started        signatures8 process9 signatures10 89 Deletes itself after installation 30->89 33 cmd.exe 1 30->33         started        process11 process12 35 notepad.exe 3 33->35         started        39 conhost.exe 33->39         started        file13 45 C:\Users\user\AppData\...\notepad.exe.log, ASCII 35->45 dropped 65 Multi AV Scanner detection for dropped file 35->65 67 Machine Learning detection for dropped file 35->67 69 Contains functionality to steal Chrome passwords or cookies 35->69 71 3 other signatures 35->71 41 notepad.exe 2 3 35->41         started        signatures14 process15 dnsIp16 55 79.134.225.119, 2404, 49766, 49767 FINK-TELECOM-SERVICESCH Switzerland 41->55 75 System process connects to network (likely due to code injection or exploit) 41->75 77 Installs a global keyboard hook 41->77 signatures17

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              PI#EB01122021.exe24%ReversingLabsByteCode-MSIL.Trojan.Remcos
              PI#EB01122021.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Remcos\notepad.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Remcos\notepad.exe24%ReversingLabsByteCode-MSIL.Trojan.Remcos

              Unpacked PE Files

              No Antivirus matches

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              79.134.225.1197%VirustotalBrowse
              79.134.225.1190%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              79.134.225.119true
              • 7%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              79.134.225.119
              unknownSwitzerland
              6775FINK-TELECOM-SERVICESCHtrue

              General Information

              Joe Sandbox Version:34.0.0 Boulder Opal
              Analysis ID:533085
              Start date:03.12.2021
              Start time:01:30:19
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 12m 39s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:PI#EB01122021.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:27
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@21/6@0/1
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 2% (good quality ratio 1.8%)
              • Quality average: 72.7%
              • Quality standard deviation: 31.9%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
              • TCP Packets have been reduced to 100
              • Excluded IPs from analysis (whitelisted): 204.79.197.222
              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp.msedge.net, a-0019.a-msedge.net, a-0019.standard.a-msedge.net, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              01:31:13API Interceptor1x Sleep call for process: PI#EB01122021.exe modified
              01:31:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run notepad "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
              01:31:23API Interceptor4x Sleep call for process: notepad.exe modified
              01:31:30AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run notepad "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
              01:31:38AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run notepad "C:\Users\user\AppData\Roaming\Remcos\notepad.exe"

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              79.134.225.119PI#EB01122021.exeGet hashmaliciousBrowse
                rfakDCTJK2.exeGet hashmaliciousBrowse
                  Bank Slip_SC -038-20210303-B.exeGet hashmaliciousBrowse
                    coPUJHusLc.exeGet hashmaliciousBrowse
                      etq08Dj8k5.exeGet hashmaliciousBrowse
                        MoJ8MTyTv7.exeGet hashmaliciousBrowse
                          DIEN CHUYEN TIEN_2021176_99.exeGet hashmaliciousBrowse
                            MX228VDuFW.exeGet hashmaliciousBrowse
                              51Payment Details.jsGet hashmaliciousBrowse

                                Domains

                                No context

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                FINK-TELECOM-SERVICESCHPI#EB01122021.exeGet hashmaliciousBrowse
                                • 79.134.225.119
                                aEhOSk9msVN2CIr.exeGet hashmaliciousBrowse
                                • 79.134.225.73
                                Order N#U00ba TM21-11-30, pdf.exeGet hashmaliciousBrowse
                                • 79.134.225.6
                                Quote Order.exeGet hashmaliciousBrowse
                                • 79.134.225.47
                                Doc0011222003.exeGet hashmaliciousBrowse
                                • 79.134.225.122
                                Purchase Order - MULBERRY PTY LTD PO# 8083 .exeGet hashmaliciousBrowse
                                • 79.134.225.112
                                BL-INV.exeGet hashmaliciousBrowse
                                • 79.134.225.20
                                IMG-1100210.jsGet hashmaliciousBrowse
                                • 79.134.225.10
                                PAYMENT DETAILS COPY-BANK SWIFT ($) USD.exeGet hashmaliciousBrowse
                                • 79.134.225.72
                                VICTORY SURE.exeGet hashmaliciousBrowse
                                • 79.134.225.69
                                WendyXclusive Co.ltd - Purchase Order.exeGet hashmaliciousBrowse
                                • 79.134.225.45
                                RFQ.exeGet hashmaliciousBrowse
                                • 79.134.225.73
                                Official Order_20211211,pdf.exeGet hashmaliciousBrowse
                                • 79.134.225.10
                                Offizielle Bestellung_20211111.exeGet hashmaliciousBrowse
                                • 79.134.225.10
                                Official Order_20211011.exeGet hashmaliciousBrowse
                                • 79.134.225.10
                                zg53yXNRlq.exeGet hashmaliciousBrowse
                                • 79.134.225.126
                                REQUEST.exeGet hashmaliciousBrowse
                                • 79.134.225.113
                                swift confirmation.exeGet hashmaliciousBrowse
                                • 79.134.225.53
                                swift copy .exeGet hashmaliciousBrowse
                                • 79.134.225.53
                                New Order 00295423.pdf.exeGet hashmaliciousBrowse
                                • 79.134.225.103

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI#EB01122021.exe.log
                                Process:C:\Users\user\Desktop\PI#EB01122021.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.345651901398759
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE47mE4Ko88:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz6
                                MD5:D918C6A765EDB90D2A227FE23A3FEC98
                                SHA1:8BA802AD8D740F114783F0DADC407CBFD2A209B3
                                SHA-256:AB0E9F716E31502A4C6786575C5E64DFD9D24AF99056BBE2640A2FA322CFF4D6
                                SHA-512:A937ABD8294BB32A612F8B3A376C94111D688379F0A4DB9FAA2FCEB71C25E18D621EEBCFDA5706B71C8473A4F38D8B3C4005D1589B564F9B1C9C441B6D337814
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\notepad.exe.log
                                Process:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.345651901398759
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE47mE4Ko88:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz6
                                MD5:D918C6A765EDB90D2A227FE23A3FEC98
                                SHA1:8BA802AD8D740F114783F0DADC407CBFD2A209B3
                                SHA-256:AB0E9F716E31502A4C6786575C5E64DFD9D24AF99056BBE2640A2FA322CFF4D6
                                SHA-512:A937ABD8294BB32A612F8B3A376C94111D688379F0A4DB9FAA2FCEB71C25E18D621EEBCFDA5706B71C8473A4F38D8B3C4005D1589B564F9B1C9C441B6D337814
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                C:\Users\user\AppData\Local\Temp\install.vbs
                                Process:C:\Users\user\Desktop\PI#EB01122021.exe
                                File Type:data
                                Category:modified
                                Size (bytes):536
                                Entropy (8bit):3.540405177941127
                                Encrypted:false
                                SSDEEP:12:4D8o++ugypjBQMB3DoRmF9W9ZvFQ4lObRKMJhpBF0M/0aimi:4Dh+SMTof9hFNObrBBF0Nait
                                MD5:85BD3D45C9BAD79506878715B9F6F8F7
                                SHA1:CB7570E41A2948557224C1AB4768C9950AA383B8
                                SHA-256:E04BEC609F113B90252164468F58FD09EA417B3C1BF514E59513CC654F4F4924
                                SHA-512:33887F8AE970ADB8D53B53173935CD548C5415BBAF1CA9CDFB20C3DE8D4FCD8E4AF261A6D13544A1AB6B2075AE6C5FF5995B45BE845DB74A2AB972FD69BA9C3A
                                Malicious:true
                                Reputation:low
                                Preview: W.S.c.r.i.p.t...S.l.e.e.p. .1.0.0.0...S.e.t. .f.s.o. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".S.c.r.i.p.t.i.n.g...F.i.l.e.S.y.s.t.e.m.O.b.j.e.c.t.".)...f.s.o...D.e.l.e.t.e.F.i.l.e. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.e.s.k.t.o.p.\.P.I.#.E.B.0.1.1.2.2.0.2.1...e.x.e."...C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...R.u.n. .".c.m.d. ./.c. .".".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.e.m.c.o.s.\.n.o.t.e.p.a.d...e.x.e.".".".,. .0...f.s.o...D.e.l.e.t.e.F.i.l.e.(.W.s.c.r.i.p.t...S.c.r.i.p.t.F.u.l.l.N.a.m.e.).
                                C:\Users\user\AppData\Roaming\Remcos\logs.dat
                                Process:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):216
                                Entropy (8bit):3.3303685363281876
                                Encrypted:false
                                SSDEEP:3:rklKlGlKElOdlfdlFWl5JWRal2Jl+7R0DAlBG45klovDl6ALilXIkqoojklovDlA:IlKDMkf65YcIeeDAlOWAAe5q1gWAv
                                MD5:AD6AF46844FDDC42C0AD9A72FAEA5B0D
                                SHA1:FD06610D74B5CD817C5736A31918124A842900E1
                                SHA-256:13698B1B5F0B451535568E3F4582762A3077290903FDEC5FA1803433093E9ED4
                                SHA-512:2DB5B3B8EC8915593701F109EDA976195E03235228CCC4A858C3CD266D7EE0BAC95E8D812FDE19CF12BAF6FDFFB44427A30EA5650BF46FF61F95CEB45B098348
                                Malicious:false
                                Preview: ....[.2.0.2.1./.1.2./.0.3. .0.1.:.3.1.:.3.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Process:C:\Users\user\Desktop\PI#EB01122021.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):780288
                                Entropy (8bit):7.895296400808854
                                Encrypted:false
                                SSDEEP:12288:dgMyXf2QLaQ2j9v+CpGjNnqFzueg4hNKeGnn5YuDcCbPIqoTgj+Q05KoTp:dny+QLa39SjNSw4zK97D9AqoUyQ0j
                                MD5:A6D5CD1E1FF086014A001BBED0D94C42
                                SHA1:BCD4CA105885E8C636603002108EC7988B08E406
                                SHA-256:68BCB49A4F5F2491EF6606A57D1713362478E18EDC2197C5DAEAF1E887533999
                                SHA-512:967CC9C323525ECAC27F7BF697477D347FAF570BFB896300B8D31106E90DE84B9501E93DE2EC5B4F9DF067C32E3F70BE506F7F872618493ACF70DF4ADF28C324
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 24%
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....V/.............................n.... ........@.. .......................@............@................................. ...K.......8.................... ....................................................... ............... ..H............text...t.... ...................... ..`.rsrc...8...........................@..@.reloc....... ......................@..B................P.......H........c..4+...............m...........................................0..........+.&.+.&..(....:....& ....8.......s....}.....{....r...p.o......{....r...p.o.... ....8W.....sF...}.....(....{...........s....(......(....{...........s....o....8N... ............E............ ...........N...=... ....8.....(....89...& ....8......(....o....& ....(....9....&*...0..........+.&...{.....8.....*..0..........+.&...{.....8.....*.6+.&....}....*...0..........+.&..(....92...& ....8U....(....
                                C:\Users\user\AppData\Roaming\Remcos\notepad.exe:Zone.Identifier
                                Process:C:\Users\user\Desktop\PI#EB01122021.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview: [ZoneTransfer]....ZoneId=0

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.895296400808854
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:PI#EB01122021.exe
                                File size:780288
                                MD5:a6d5cd1e1ff086014a001bbed0d94c42
                                SHA1:bcd4ca105885e8c636603002108ec7988b08e406
                                SHA256:68bcb49a4f5f2491ef6606a57d1713362478e18edc2197c5daeaf1e887533999
                                SHA512:967cc9c323525ecac27f7bf697477d347faf570bfb896300b8d31106e90de84b9501e93de2ec5b4f9df067c32e3f70be506f7f872618493acf70df4adf28c324
                                SSDEEP:12288:dgMyXf2QLaQ2j9v+CpGjNnqFzueg4hNKeGnn5YuDcCbPIqoTgj+Q05KoTp:dny+QLa39SjNSw4zK97D9AqoUyQ0j
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....V/.............................n.... ........@.. .......................@............@................................

                                File Icon

                                Icon Hash:00828e8e8686b000

                                Static PE Info

                                General

                                Entrypoint:0x4bfc6e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x9E2F5619 [Thu Feb 5 11:06:01 2054 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbfc200x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x538.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xbdc740xbde00False0.93131403267data7.90145393477IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0xc00000x5380x600False0.38671875data3.89389384502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0xc00a00x2acdata
                                RT_MANIFEST0xc034c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyright
                                Assembly Version0.0.0.0
                                InternalNameAssemblyTargetedPatchBandAttribu.exe
                                FileVersion0.0.0.0
                                ProductVersion0.0.0.0
                                FileDescription
                                OriginalFilenameAssemblyTargetedPatchBandAttribu.exe

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Dec 3, 2021 01:31:31.796647072 CET497662404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:31.827233076 CET24044976679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:32.379050016 CET497662404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:32.409466982 CET24044976679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:33.006211996 CET497662404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:33.036724091 CET24044976679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:34.055265903 CET497672404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:34.085547924 CET24044976779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:34.600111961 CET497672404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:34.630580902 CET24044976779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:35.131403923 CET497672404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:35.161885977 CET24044976779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:36.163609028 CET497682404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:36.194062948 CET24044976879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:36.709625959 CET497682404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:36.742842913 CET24044976879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:37.256560087 CET497682404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:37.287219048 CET24044976879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:38.289046049 CET497692404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:38.319526911 CET24044976979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:38.834826946 CET497692404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:38.865262032 CET24044976979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:39.366133928 CET497692404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:39.396601915 CET24044976979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:40.414143085 CET497722404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:40.444540024 CET24044977279.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:40.960097075 CET497722404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:40.990638018 CET24044977279.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:41.491354942 CET497722404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:41.521863937 CET24044977279.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:42.539155006 CET497732404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:42.569941044 CET24044977379.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:43.085192919 CET497732404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:43.115619898 CET24044977379.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:43.616569996 CET497732404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:43.646943092 CET24044977379.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:44.649660110 CET497742404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:44.680172920 CET24044977479.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:45.194793940 CET497742404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:45.225136995 CET24044977479.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:45.741730928 CET497742404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:45.772358894 CET24044977479.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:46.906619072 CET497752404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:46.937144995 CET24044977579.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:47.444998980 CET497752404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:47.475404978 CET24044977579.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:47.991914034 CET497752404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:48.022411108 CET24044977579.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:49.602528095 CET497762404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:49.633070946 CET24044977679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:50.148294926 CET497762404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:50.178800106 CET24044977679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:50.742090940 CET497762404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:50.772504091 CET24044977679.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:51.774188995 CET497772404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:51.805197954 CET24044977779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:52.320367098 CET497772404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:52.350718975 CET24044977779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:52.851613045 CET497772404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:52.882185936 CET24044977779.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:53.884025097 CET497782404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:53.914273977 CET24044977879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:54.414258003 CET497782404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:54.445322990 CET24044977879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:54.945545912 CET497782404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:54.976002932 CET24044977879.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:55.977864981 CET497792404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:56.008330107 CET24044977979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:56.523829937 CET497792404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:56.554112911 CET24044977979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:57.070743084 CET497792404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:57.101393938 CET24044977979.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:58.103660107 CET497802404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:58.134044886 CET24044978079.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:58.652195930 CET497802404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:58.682579994 CET24044978079.134.225.119192.168.2.4
                                Dec 3, 2021 01:31:59.196010113 CET497802404192.168.2.479.134.225.119
                                Dec 3, 2021 01:31:59.226409912 CET24044978079.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:00.229795933 CET497812404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:00.260360956 CET24044978179.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:00.774178982 CET497812404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:00.804569960 CET24044978179.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:01.305574894 CET497812404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:01.335975885 CET24044978179.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:02.370176077 CET497822404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:02.400697947 CET24044978279.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:02.915092945 CET497822404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:02.945588112 CET24044978279.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:03.461905003 CET497822404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:03.492331982 CET24044978279.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:04.510576010 CET497832404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:04.541223049 CET24044978379.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:05.055867910 CET497832404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:05.086349010 CET24044978379.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:05.587061882 CET497832404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:05.617295027 CET24044978379.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:06.623729944 CET497842404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:06.654201984 CET24044978479.134.225.119192.168.2.4
                                Dec 3, 2021 01:32:07.165405989 CET497842404192.168.2.479.134.225.119
                                Dec 3, 2021 01:32:07.196155071 CET24044978479.134.225.119192.168.2.4

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Dec 3, 2021 01:31:30.705626965 CET8.8.8.8192.168.2.40x52b2No error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:01:31:11
                                Start date:03/12/2021
                                Path:C:\Users\user\Desktop\PI#EB01122021.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\PI#EB01122021.exe"
                                Imagebase:0x50000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.670529475.0000000002481000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.671210492.0000000003489000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:01:31:14
                                Start date:03/12/2021
                                Path:C:\Users\user\Desktop\PI#EB01122021.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\PI#EB01122021.exe
                                Imagebase:0xae0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.665707954.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.668087697.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.667581883.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.666944230.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.674208538.0000000000FB7000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.664681826.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.665184295.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.673320463.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000000.666364820.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                Reputation:low

                                General

                                Start time:01:31:19
                                Start date:03/12/2021
                                Path:C:\Windows\SysWOW64\wscript.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
                                Imagebase:0x12f0000
                                File size:147456 bytes
                                MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:01:31:21
                                Start date:03/12/2021
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0x11d0000
                                File size:232960 bytes
                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:01:31:22
                                Start date:03/12/2021
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff724c50000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:01:31:22
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0x6d0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.700890125.00000000029D1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.701679427.00000000039D9000.00000004.00000001.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 24%, ReversingLabs
                                Reputation:low

                                General

                                Start time:01:31:25
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0xca0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.923611069.0000000001307000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.698084508.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.697551075.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.690545853.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.696164588.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000002.923123873.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.691529752.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.691017660.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000000.688839344.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                Reputation:low

                                General

                                Start time:01:31:30
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
                                Imagebase:0xaa0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.711320797.0000000002E31000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.713877257.0000000003E39000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:01:31:32
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0xae0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.710552942.00000000010F7000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.706138674.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.708512420.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.709640591.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.707894778.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.706739548.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.707310183.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000000.709107178.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.710208184.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                Reputation:low

                                General

                                Start time:01:31:38
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
                                Imagebase:0x8a0000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000E.00000002.735784569.0000000002ED1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.736965742.0000000003ED9000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:01:31:41
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0x940000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.723857494.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.727672917.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.724829494.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000002.729381755.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.725530815.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.728757346.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.729849603.0000000001027000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.726516834.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000000.724333978.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                Reputation:low

                                General

                                Start time:01:31:46
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\Remcos\notepad.exe"
                                Imagebase:0x830000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000011.00000002.752762231.0000000002BC1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.753512383.0000000003BC9000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:01:31:51
                                Start date:03/12/2021
                                Path:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Roaming\Remcos\notepad.exe
                                Imagebase:0x510000
                                File size:780288 bytes
                                MD5 hash:A6D5CD1E1FF086014A001BBED0D94C42
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.747132927.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.746294295.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000002.750190502.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.746714985.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.747620790.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.750930266.0000000000A37000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.748212725.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.749457172.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000012.00000000.748825104.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >