Analysis

  • max time kernel
    38s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-01-2021 07:17

General

  • Target

    PO-scandocumentsfile00108392.exe

  • Size

    851KB

  • MD5

    ed01719e79f8008d4ede16e7edff753a

  • SHA1

    9929ccd810f335d2d2b84e7ba519940bb9f58fe8

  • SHA256

    a7ada9eefa9c775d0215af6bc497e305f8067290f5e9642e582c6d4c3ec65756

  • SHA512

    188adc96dbef43ddc4f110958bf68920288a0b9759317a473e78e146bd302ace63de73da93ec9e644e3526ed9d69472a47ac178e6e3d84ea93ccf21a5a3fab90

Score
10/10

Malware Config

Extracted

Family

remcos

C2

www.maneediem.com:2404

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO-scandocumentsfile00108392.exe
    "C:\Users\Admin\AppData\Local\Temp\PO-scandocumentsfile00108392.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "{path}"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:284
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            5⤵
            • Executes dropped EXE
            PID:572

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.vbs
    MD5

    79f2f9da0b9014aaa835d1486a0a6135

    SHA1

    ffe17bfd9b43abf97d526ee85970b370d60eef0b

    SHA256

    d7e5cbc45f2651767966aff75220c6c9094ecaf7a04d978f021087fd03f5d428

    SHA512

    7b05babc0fb5f931c8f889491c05b44684bc851998b93163ea2698e20a6ad9871afc9cf3ff424d7c9edd8f7dc05e1929e2f65593ca927a1574319df96051ebb8

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • \Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    1f7bccc57d21a4bfeddaafe514cfd74d

    SHA1

    4dab09179a12468cb1757cb7ca26e06d616b0a8d

    SHA256

    d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061

    SHA512

    9e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8

  • memory/284-10-0x0000000000000000-mapping.dmp
  • memory/284-13-0x00000000025F0000-0x00000000025F4000-memory.dmp
    Filesize

    16KB

  • memory/292-3-0x0000000000A50000-0x0000000000A51000-memory.dmp
    Filesize

    4KB

  • memory/292-5-0x0000000000320000-0x000000000032E000-memory.dmp
    Filesize

    56KB

  • memory/292-6-0x0000000004950000-0x000000000498E000-memory.dmp
    Filesize

    248KB

  • memory/292-2-0x00000000748A0000-0x0000000074F8E000-memory.dmp
    Filesize

    6.9MB

  • memory/572-16-0x0000000000000000-mapping.dmp
  • memory/896-9-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB

  • memory/896-8-0x0000000000413FA4-mapping.dmp
  • memory/896-7-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB

  • memory/1008-12-0x0000000000000000-mapping.dmp