Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    09-07-2020 00:36

General

  • Target

    remcos.exe

  • Size

    649KB

  • MD5

    c088802b03e3bc1ef0082f268847a5f7

  • SHA1

    28fd21058e88cd0e77cc9da119c7b7ecd582e2ac

  • SHA256

    4444f1da7f9b30eb4fb593b9492e42745332402980e118b6a0431c7d1f5670ce

  • SHA512

    6f296335284aa8337a60df52ffae7f87eb29502cea0ab050e2429ad841f79cd757a3e75a75cfb32463458d646d92ead9476c99fa4d058113be02b903b99e0d6a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of WriteProcessMemory 537 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcos.exe
    "C:\Users\Admin\AppData\Local\Temp\remcos.exe"
    1⤵
    • Adds Run entry to start application
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\TapiUnattend.exe
      "C:\Windows\System32\TapiUnattend.exe"
      2⤵
        PID:1060
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Public\Natso.bat
          3⤵
            PID:1272
            • C:\Windows\SysWOW64\reg.exe
              reg delete hkcu\Environment /v windir /f
              4⤵
              • Modifies registry key
              PID:1852
            • C:\Windows\SysWOW64\reg.exe
              reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "
              4⤵
              • Modifies registry key
              PID:1412
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
              4⤵
                PID:1660
              • C:\Windows\SysWOW64\reg.exe
                reg delete hkcu\Environment /v windir /f
                4⤵
                • Modifies registry key
                PID:660
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Users\Public\Runex.bat
              3⤵
                PID:1532
                • C:\Windows \System32\fodhelper.exe
                  "C:\Windows \System32\fodhelper.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:1316
                • C:\Windows \System32\fodhelper.exe
                  "C:\Windows \System32\fodhelper.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:1384
            • C:\Program Files (x86)\internet explorer\ieinstal.exe
              "C:\Program Files (x86)\internet explorer\ieinstal.exe"
              2⤵
                PID:1500

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1100-130-0x0000000010530000-0x000000001054A000-memory.dmp

              Filesize

              104KB

            • memory/1100-124-0x0000000010410000-0x0000000010450000-memory.dmp

              Filesize

              256KB