Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    18-02-2020 17:03

General

  • Target

    remcos.bin.exe

  • Size

    360KB

  • MD5

    c8cd8226c29bbaed1b40691f25793833

  • SHA1

    e6e802589ce0589bb1a7b17f93661dcffb67598d

  • SHA256

    d783cab5c5ae5cada441b48ab938855e5fb5a0f696f31f86d68479041cc991cf

  • SHA512

    3de43aae6c5fb9bc8e900ed73f3c26ccc5fbe32ed283cfb6cfc30af4e2d2fb3402723d1298f5a82d4c6cbc50b8da59b602ddb702b45a23ccef2db1f34950e758

Score
10/10

Malware Config

Extracted

Family

remcos

C2

185.140.53.153:2404

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 77 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run entry to start application 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcos.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\remcos.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file "C:\Users\Public\sysq.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetThreadContext
      PID:1908
      • C:\Users\Admin\AppData\Local\Temp\remcos.bin.exe
        "{path}"
        3⤵
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetThreadContext
        PID:2008
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dvYyogXCbN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9AD7.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:288
        • C:\Users\Admin\AppData\Local\Temp\remcos.bin.exe
          "{path}"
          4⤵
          • Suspicious use of WriteProcessMemory
          • Adds Run entry to start application
          PID:1520
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:808
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1596
              • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                • Executes dropped EXE
                PID:1540
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file "C:\Users\Public\sysq.ps1"
                  8⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetThreadContext
                  PID:1624
                  • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                    "{path}"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    • Suspicious use of SetThreadContext
                    • Executes dropped EXE
                    PID:1708
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dvYyogXCbN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8B9B.tmp"
                      10⤵
                      • Creates scheduled task(s)
                      PID:776
                    • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                      "{path}"
                      10⤵
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of SetThreadContext
                      • Executes dropped EXE
                      • Adds Run entry to start application
                      PID:560
                      • C:\Windows\SysWOW64\svchost.exe
                        C:\Windows\SysWOW64\svchost.exe
                        11⤵
                          PID:868

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Registry Run Keys / Startup Folder

    1
    T1060

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs
    • C:\Users\Admin\AppData\Local\Temp\tmp8B9B.tmp
    • C:\Users\Admin\AppData\Local\Temp\tmp9AD7.tmp
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
    • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
    • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
    • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
    • C:\Users\Public\sysq.ps1
    • C:\Users\Public\sysq.ps1
    • \Users\Admin\AppData\Roaming\remcos\remcos.exe
    • memory/560-25-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/808-10-0x0000000002780000-0x0000000002784000-memory.dmp
      Filesize

      16KB

    • memory/868-26-0x0000000000400000-0x0000000000460000-memory.dmp
      Filesize

      384KB

    • memory/868-27-0x0000000000400000-0x0000000000460000-memory.dmp
      Filesize

      384KB

    • memory/868-28-0x0000000000400000-0x0000000000460000-memory.dmp
      Filesize

      384KB

    • memory/1520-7-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1520-8-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/2008-4-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/2008-5-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/2008-3-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB