Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 07:33

General

  • Target

    PO-Scan-Documents00012910993993.exe

  • Size

    177KB

  • MD5

    a2c17f6556ae89a8a1683f889bffc7e9

  • SHA1

    cf2aa59cc8e074dfd3d72b052beef746aba1fe6a

  • SHA256

    4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7

  • SHA512

    9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe
    "C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-Scan-Documents00012910993993.exe"
      2⤵
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
              "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:860
              • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
                "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetWindowsHookEx
                PID:1180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.vbs

    MD5

    9e135ae175d8ca757b78131835f5e729

    SHA1

    fcd3722e6c77d35886a83c05fa3cd7bf5f43619d

    SHA256

    17558302b8a73bb2bd3da41948c3e6285ffa13c365fdc401b9ca69a49caac031

    SHA512

    9c28aa019fe942d81bdee0ae100e27c155c588c5328446935858ffffaaf9656974e0b161180ec35e76f5f161b4f7a8bf289f735c93ab907aea1d2340b3b316ae

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe

    MD5

    a2c17f6556ae89a8a1683f889bffc7e9

    SHA1

    cf2aa59cc8e074dfd3d72b052beef746aba1fe6a

    SHA256

    4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7

    SHA512

    9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe

    MD5

    a2c17f6556ae89a8a1683f889bffc7e9

    SHA1

    cf2aa59cc8e074dfd3d72b052beef746aba1fe6a

    SHA256

    4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7

    SHA512

    9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe

    MD5

    a2c17f6556ae89a8a1683f889bffc7e9

    SHA1

    cf2aa59cc8e074dfd3d72b052beef746aba1fe6a

    SHA256

    4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7

    SHA512

    9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe

    MD5

    a2c17f6556ae89a8a1683f889bffc7e9

    SHA1

    cf2aa59cc8e074dfd3d72b052beef746aba1fe6a

    SHA256

    4c61692f5b36f6b2b136958c7c315113899a1bdb1cfe7415f37c0acfdaab01a7

    SHA512

    9f18670e24387969db2fee5cbc9698cfdac86997d1b5ac63e39cf973e0170473440ed3cd0a130ab00b339bf89802b14da425f52bb5c62c651eea0c486a993b37

  • memory/752-6-0x0000000000000000-mapping.dmp

  • memory/860-9-0x0000000000000000-mapping.dmp

  • memory/1180-11-0x0000000000000000-mapping.dmp

  • memory/1816-3-0x0000000000000000-mapping.dmp

  • memory/3024-2-0x0000000000000000-mapping.dmp

  • memory/3292-5-0x0000000000000000-mapping.dmp