Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-01-2021 08:26

General

  • Target

    Sydler_Remedies_PO-SCAN-3K4RQ4WPJ4.exe

  • Size

    290KB

  • MD5

    e8f7d121f3d4e0d641a12895c7b287ac

  • SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

  • SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

  • SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

Score
10/10

Malware Config

Extracted

Family

remcos

C2

www.maneediem.com:2404

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sydler_Remedies_PO-SCAN-3K4RQ4WPJ4.exe
    "C:\Users\Admin\AppData\Local\Temp\Sydler_Remedies_PO-SCAN-3K4RQ4WPJ4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Users\Admin\AppData\Local\Temp\Sydler_Remedies_PO-SCAN-3K4RQ4WPJ4.exe
      "C:\Users\Admin\AppData\Local\Temp\Sydler_Remedies_PO-SCAN-3K4RQ4WPJ4.exe"
      2⤵
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:696
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
              C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
              6⤵
              • Executes dropped EXE
              PID:3640
            • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
              "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:812
              • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
                "C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetWindowsHookEx
                PID:1140

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.vbs
    MD5

    cf41587b4d8b0e225200704be70b24fe

    SHA1

    0036c9bfb6fd7f8ac76620e051fb98a09a6bfa1f

    SHA256

    7bf6b05f5d0dd921e35ddefc7ea7c84c29ab7b27f30f8e3e918a591b4ff97dcd

    SHA512

    8aae23f935e3f167890c4a2add610bf696b74618aa1f40c65560df48f38f79b04a7155217497cd402cab7bd5f401211a8721fd90fa3a76e1f96aa9d919e61935

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    e8f7d121f3d4e0d641a12895c7b287ac

    SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

    SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

    SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    e8f7d121f3d4e0d641a12895c7b287ac

    SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

    SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

    SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    e8f7d121f3d4e0d641a12895c7b287ac

    SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

    SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

    SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    e8f7d121f3d4e0d641a12895c7b287ac

    SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

    SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

    SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

  • C:\Users\Admin\AppData\Roaming\owerri\owerrinta.exe
    MD5

    e8f7d121f3d4e0d641a12895c7b287ac

    SHA1

    17757b821ee9b081fcc142dcc7aff5a147de6095

    SHA256

    a2925ab4b7c0267fb273b9125b81673c84525a2e974119dd6c6f3c10ac6675f5

    SHA512

    2ff90e19afd3e9cc902c105ec861b0927b0b665c38b908f4a6f619a75f6568dfa0538900ce44699a7f2e6897d8ae6dabf7addb88b39d47f66edfadf241bdb2ed

  • memory/696-3-0x0000000000000000-mapping.dmp
  • memory/812-11-0x0000000000000000-mapping.dmp
  • memory/1140-13-0x0000000000413FA4-mapping.dmp
  • memory/1140-15-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB

  • memory/2252-7-0x0000000000000000-mapping.dmp
  • memory/2308-6-0x0000000000000000-mapping.dmp
  • memory/4068-2-0x0000000000413FA4-mapping.dmp
  • memory/4068-5-0x0000000000400000-0x0000000000421000-memory.dmp
    Filesize

    132KB