Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-01-2021 09:34

General

  • Target

    Original BL_pdf.scr

  • Size

    136KB

  • MD5

    7fd79d1258fa8ed52e0d49bd780acd2e

  • SHA1

    ede2f547aae04f958172240dfd6cd0b76990e006

  • SHA256

    581bd1167bd9b40944de9a2d8842ed8aa841fdfc69d896c24520873095e0ac03

  • SHA512

    8b093424dccf6f879a792a6516536c8e02d771d0f7cd69eb706c553a0d75121a2cf9172c0f91de0c53189ce8eb6928e0b2a3ec4503024d63eb3090ec22c0feb0

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr
    "C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr" /S
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Users\Admin\AppData\Local\Temp\Original BL_pdf.scr" /S
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:1300

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1300-4-0x00000000001F0000-0x00000000002F0000-memory.dmp
    Filesize

    1024KB

  • memory/1300-5-0x00000000001F0000-mapping.dmp
  • memory/1456-6-0x000007FEF72E0000-0x000007FEF755A000-memory.dmp
    Filesize

    2.5MB