Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07-07-2020 15:22

General

  • Target

    8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe

  • Size

    363KB

  • MD5

    8b6be0ea00b0d6a83236ca3884b6b4e7

  • SHA1

    f6567ce57e9ab3bedf98456e1cac5cb9eceeddd0

  • SHA256

    8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7

  • SHA512

    2feb48679b1a2b7ea17144c2825cdfee1a3cdbc0e2d79496bca5842ff479b416a2c3e4e9954bce62246780d2de991b58c66bcab8f548ed7f8f008324171cacf9

Malware Config

Extracted

Family

remcos

C2

79.134.225.112:1774

Signatures

  • Suspicious use of SetThreadContext 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Adds Run entry to start application 2 TTPs 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Adds Run entry to policy start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Executes dropped EXE 3 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Checks whether UAC is enabled
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe
      "C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe
        "C:\Users\Admin\AppData\Local\Temp\8e3a1e5e016c43fabdd6b96b788c1bc8d7721fa1fd99fa573089d73a074653c7.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1292
        • C:\Users\Admin\AppData\Local\Temp\bin.exe
          "C:\Users\Admin\AppData\Local\Temp\bin.exe" 0
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: MapViewOfSection
          • Suspicious behavior: EnumeratesProcesses
          • Executes dropped EXE
          PID:1388
        • C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe
          "C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe" 0
          4⤵
          • Adds Run entry to start application
          • Suspicious use of WriteProcessMemory
          • Executes dropped EXE
          PID:1876
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1904
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1972
              • C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe
                "C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe"
                7⤵
                • Suspicious use of SetThreadContext
                • Adds Run entry to start application
                • Suspicious use of WriteProcessMemory
                • Executes dropped EXE
                PID:1996
                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                  8⤵
                  • Suspicious use of SetThreadContext
                  • Adds Run entry to start application
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2024
                  • C:\Windows\SysWOW64\svchost.exe
                    C:\Windows\SysWOW64\svchost.exe
                    9⤵
                      PID:1832
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: MapViewOfSection
        • Suspicious behavior: EnumeratesProcesses
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Adds Run entry to policy start application
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1740
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"
          3⤵
            PID:1572
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:1868

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bin.exe

        • C:\Users\Admin\AppData\Local\Temp\bin.exe

        • C:\Users\Admin\AppData\Local\Temp\install.vbs

        • C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe

        • C:\Users\Admin\AppData\Local\Temp\remcos_agent.exe

        • C:\Users\Admin\AppData\Roaming\3NAR161B\3NAlogim.jpeg

        • C:\Users\Admin\AppData\Roaming\3NAR161B\3NAlogrf.ini

        • C:\Users\Admin\AppData\Roaming\3NAR161B\3NAlogri.ini

        • C:\Users\Admin\AppData\Roaming\3NAR161B\3NAlogrv.ini

        • C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe

        • C:\Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe

        • \Users\Admin\AppData\Local\Temp\bin.exe

        • \Users\Admin\AppData\Local\Temp\bin.exe

        • \Users\Admin\AppData\Local\Temp\remcos_agent.exe

        • \Users\Admin\AppData\Local\Temp\remcos_agent.exe

        • \Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe

        • \Users\Admin\AppData\Roaming\Windows Essential\Windows Essential.exe

        • memory/1212-38-0x0000000007AE0000-0x0000000007BF9000-memory.dmp

          Filesize

          1.1MB

        • memory/1212-32-0x0000000007940000-0x0000000007ADE000-memory.dmp

          Filesize

          1.6MB

        • memory/1292-4-0x000000000040104C-mapping.dmp

        • memory/1292-5-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/1292-3-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/1388-10-0x0000000000000000-mapping.dmp

        • memory/1516-0-0x00000000042CC000-0x00000000042CD000-memory.dmp

          Filesize

          4KB

        • memory/1516-2-0x0000000005AE0000-0x0000000005AF1000-memory.dmp

          Filesize

          68KB

        • memory/1516-1-0x0000000005AE0000-0x0000000005AF1000-memory.dmp

          Filesize

          68KB

        • memory/1572-36-0x0000000000000000-mapping.dmp

        • memory/1740-37-0x00000000005D0000-0x0000000000675000-memory.dmp

          Filesize

          660KB

        • memory/1740-33-0x0000000000000000-mapping.dmp

        • memory/1740-34-0x0000000000C90000-0x0000000000C98000-memory.dmp

          Filesize

          32KB

        • memory/1740-40-0x00000000037F0000-0x000000000391A000-memory.dmp

          Filesize

          1.2MB

        • memory/1832-30-0x0000000000413B74-mapping.dmp

        • memory/1868-42-0x000000013F870000-0x000000013F903000-memory.dmp

          Filesize

          588KB

        • memory/1868-41-0x0000000000000000-mapping.dmp

        • memory/1876-14-0x0000000000000000-mapping.dmp

        • memory/1904-20-0x0000000002550000-0x0000000002554000-memory.dmp

          Filesize

          16KB

        • memory/1904-17-0x0000000000000000-mapping.dmp

        • memory/1972-19-0x0000000000000000-mapping.dmp

        • memory/1996-24-0x0000000000000000-mapping.dmp

        • memory/2024-39-0x00000000C0000034-mapping.dmp

        • memory/2024-28-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2024-27-0x0000000000413B74-mapping.dmp

        • memory/2024-26-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB