Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
New REMCOS TES.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
New REMCOS TES.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
New REMCOS TES.exe
-
Size
878KB
-
MD5
611eb8ef2416aa09b16bbce28e1ec33a
-
SHA1
20dfdd65a715575754c903ffcbe871ce82f2736b
-
SHA256
c0b1ba178d886a9d71fb7ffd5b169bf023021e13c545e3cd8d15461221dd2006
-
SHA512
63147896ce05d9f0a4e44f2f4a4d00f1a631219e114cb05ba40c662b0f6b828b9f95ba96a175503a6a496ad4c5e2b968f2c56ca8f0a8f782887e23ad2bdec023
Score
10/10
Malware Config
Extracted
Family
remcos
C2
185.140.53.209:1990
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1976 chrome.exe 2572 chrome.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 976 New REMCOS TES.exe 1976 chrome.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 976 set thread context of 3876 976 New REMCOS TES.exe 67 PID 1976 set thread context of 2572 1976 chrome.exe 72 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2572 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 chrome.exe -
Adds Run entry to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\localhost = "\"C:\\Users\\Admin\\AppData\\Roaming\\chrome.exe\"" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ New REMCOS TES.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\localhost = "\"C:\\Users\\Admin\\AppData\\Roaming\\chrome.exe\"" New REMCOS TES.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings New REMCOS TES.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 976 New REMCOS TES.exe 976 New REMCOS TES.exe 1976 chrome.exe 1976 chrome.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 976 wrote to memory of 3876 976 New REMCOS TES.exe 67 PID 976 wrote to memory of 3876 976 New REMCOS TES.exe 67 PID 976 wrote to memory of 3876 976 New REMCOS TES.exe 67 PID 3876 wrote to memory of 3948 3876 New REMCOS TES.exe 68 PID 3876 wrote to memory of 3948 3876 New REMCOS TES.exe 68 PID 3876 wrote to memory of 3948 3876 New REMCOS TES.exe 68 PID 3948 wrote to memory of 3992 3948 WScript.exe 69 PID 3948 wrote to memory of 3992 3948 WScript.exe 69 PID 3948 wrote to memory of 3992 3948 WScript.exe 69 PID 3992 wrote to memory of 1976 3992 cmd.exe 71 PID 3992 wrote to memory of 1976 3992 cmd.exe 71 PID 3992 wrote to memory of 1976 3992 cmd.exe 71 PID 1976 wrote to memory of 2572 1976 chrome.exe 72 PID 1976 wrote to memory of 2572 1976 chrome.exe 72 PID 1976 wrote to memory of 2572 1976 chrome.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\New REMCOS TES.exe"C:\Users\Admin\AppData\Local\Temp\New REMCOS TES.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\New REMCOS TES.exe"C:\Users\Admin\AppData\Local\Temp\New REMCOS TES.exe"2⤵
- Adds Run entry to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\chrome.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Roaming\chrome.exeC:\Users\Admin\AppData\Roaming\chrome.exe5⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\chrome.exeC:\Users\Admin\AppData\Roaming\chrome.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: GetForegroundWindowSpam
- Adds Run entry to start application
PID:2572
-
-
-
-
-