Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    06-01-2021 18:12

General

  • Target

    Quotation.exe

  • Size

    720KB

  • MD5

    a71b92a0262b4067b2da39ad1f39bef5

  • SHA1

    5fab5dc05795e35879eeab69f9c8172e4963431c

  • SHA256

    1787f73acf804bff30fe863e077fb5bc9799b3cb39065534198f894757907e79

  • SHA512

    8ca4c96e2942b8da52e5644fee5bd9c90beaa91d2cb52aeab83955dbc98d71269d280c530908ef4811b5c06833720ece2d8b3666f030b66b8e40b1e769eab7a3

Malware Config

Extracted

Family

remcos

C2

whatgodcannotdodoestnotexist.duckdns.org:2889

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 69 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\rthfy.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\rthfy.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:1756
    • C:\Users\Admin\rthfy.exe
      "C:\Users\Admin\rthfy.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:920
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1680
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:824
                • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                  C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\bnjspkfnjwtzpvbm"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:956
                • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                  C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\lholqcppxelercqygpi"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:516
                • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                  C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\vjbdrvaitmdjbqmcpzvnjdo"
                  8⤵
                  • Executes dropped EXE
                  PID:804
        • C:\Users\Admin\AppData\Local\Temp\FB_C4A7.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\FB_C4A7.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:1452

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
    MD5

    6a673bfc3b67ae9782cb31af2f234c68

    SHA1

    7544e89566d91e84e3cd437b9a073e5f6b56566e

    SHA256

    978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

    SHA512

    72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
    MD5

    6a673bfc3b67ae9782cb31af2f234c68

    SHA1

    7544e89566d91e84e3cd437b9a073e5f6b56566e

    SHA256

    978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

    SHA512

    72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

  • C:\Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Local\Temp\FB_C4A7.tmp.exe
    MD5

    74bafb3e707c7b0c63938ac200f99c7f

    SHA1

    10c5506337845ed9bf25c73d2506f9c15ab8e608

    SHA256

    129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

    SHA512

    5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

  • C:\Users\Admin\AppData\Local\Temp\bnjspkfnjwtzpvbm
    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Local\Temp\install.vbs
    MD5

    b92d64fe5b1d1f59df4b738262aea8df

    SHA1

    c8fb1981759c2d9bb2ec91b705985fba5fc7af63

    SHA256

    fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a

    SHA512

    2566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • C:\Users\Admin\rthfy.exe
    MD5

    a71b92a0262b4067b2da39ad1f39bef5

    SHA1

    5fab5dc05795e35879eeab69f9c8172e4963431c

    SHA256

    1787f73acf804bff30fe863e077fb5bc9799b3cb39065534198f894757907e79

    SHA512

    8ca4c96e2942b8da52e5644fee5bd9c90beaa91d2cb52aeab83955dbc98d71269d280c530908ef4811b5c06833720ece2d8b3666f030b66b8e40b1e769eab7a3

  • C:\Users\Admin\rthfy.exe
    MD5

    a71b92a0262b4067b2da39ad1f39bef5

    SHA1

    5fab5dc05795e35879eeab69f9c8172e4963431c

    SHA256

    1787f73acf804bff30fe863e077fb5bc9799b3cb39065534198f894757907e79

    SHA512

    8ca4c96e2942b8da52e5644fee5bd9c90beaa91d2cb52aeab83955dbc98d71269d280c530908ef4811b5c06833720ece2d8b3666f030b66b8e40b1e769eab7a3

  • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
    MD5

    6a673bfc3b67ae9782cb31af2f234c68

    SHA1

    7544e89566d91e84e3cd437b9a073e5f6b56566e

    SHA256

    978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

    SHA512

    72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

  • \Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • \Users\Admin\AppData\Local\Temp\FB_C39D.tmp.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • \Users\Admin\AppData\Local\Temp\FB_C4A7.tmp.exe
    MD5

    74bafb3e707c7b0c63938ac200f99c7f

    SHA1

    10c5506337845ed9bf25c73d2506f9c15ab8e608

    SHA256

    129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

    SHA512

    5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

  • \Users\Admin\AppData\Local\Temp\FB_C4A7.tmp.exe
    MD5

    74bafb3e707c7b0c63938ac200f99c7f

    SHA1

    10c5506337845ed9bf25c73d2506f9c15ab8e608

    SHA256

    129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689

    SHA512

    5b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781

  • \Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • \Users\Admin\AppData\Roaming\Remcos\remcos.exe
    MD5

    920bf95d5f010f210c475dada3a27c6f

    SHA1

    aaea82158ce6ddbf40ac786cc914d3b33f2d8e2b

    SHA256

    2cb54ba4e33af4b048dfa9aa0d13ce7ddf0f197bfba76ba88d5289d1108dd038

    SHA512

    32c7b15bed528b9108a2e3b1ee12b857e7ae4f72f4c54a9d9fb139e1eb663bfeb9f8bf2da0a4c4f35e68d730f39af7e69e8b33f692ae45675a486b0bf1fea1c2

  • \Users\Admin\rthfy.exe
    MD5

    a71b92a0262b4067b2da39ad1f39bef5

    SHA1

    5fab5dc05795e35879eeab69f9c8172e4963431c

    SHA256

    1787f73acf804bff30fe863e077fb5bc9799b3cb39065534198f894757907e79

    SHA512

    8ca4c96e2942b8da52e5644fee5bd9c90beaa91d2cb52aeab83955dbc98d71269d280c530908ef4811b5c06833720ece2d8b3666f030b66b8e40b1e769eab7a3

  • memory/240-18-0x00000000009F0000-0x00000000009FB000-memory.dmp
    Filesize

    44KB

  • memory/240-19-0x0000000004120000-0x0000000004121000-memory.dmp
    Filesize

    4KB

  • memory/240-10-0x0000000000000000-mapping.dmp
  • memory/240-13-0x0000000073E00000-0x00000000744EE000-memory.dmp
    Filesize

    6.9MB

  • memory/240-14-0x0000000000A00000-0x0000000000A01000-memory.dmp
    Filesize

    4KB

  • memory/516-47-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/516-54-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/516-51-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/516-48-0x0000000000422206-mapping.dmp
  • memory/516-7-0x0000000000000000-mapping.dmp
  • memory/804-52-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/804-55-0x0000000000455238-mapping.dmp
  • memory/804-57-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/804-58-0x0000000000400000-0x0000000000457000-memory.dmp
    Filesize

    348KB

  • memory/824-42-0x0000000000000000-mapping.dmp
  • memory/920-28-0x0000000000000000-mapping.dmp
  • memory/956-45-0x0000000000476274-mapping.dmp
  • memory/956-44-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/956-50-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/956-53-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/1124-22-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1124-23-0x0000000000401190-mapping.dmp
  • memory/1124-25-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1452-33-0x0000000000000000-mapping.dmp
  • memory/1680-38-0x0000000002680000-0x0000000002684000-memory.dmp
    Filesize

    16KB

  • memory/1680-35-0x0000000000000000-mapping.dmp
  • memory/1708-37-0x0000000000000000-mapping.dmp
  • memory/1716-59-0x000007FEF79D0000-0x000007FEF7C4A000-memory.dmp
    Filesize

    2.5MB

  • memory/1756-8-0x0000000000000000-mapping.dmp
  • memory/1844-2-0x0000000073E00000-0x00000000744EE000-memory.dmp
    Filesize

    6.9MB

  • memory/1844-5-0x00000000003D0000-0x00000000003EE000-memory.dmp
    Filesize

    120KB

  • memory/1844-6-0x0000000000300000-0x0000000000301000-memory.dmp
    Filesize

    4KB

  • memory/1844-3-0x0000000000E10000-0x0000000000E11000-memory.dmp
    Filesize

    4KB