Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 14:35

General

  • Target

    NEWORDERrefno0992883jpg.exe

  • Size

    96KB

  • MD5

    55124bc60c871581f110b6f09e8ee902

  • SHA1

    a198c5115c4d7f9e61a06020c814c2b5b4fba0f8

  • SHA256

    8c6cae9078b175b331c1d6154045deea386850a75e4e2a250fe4f4d920cf1a4a

  • SHA512

    50d7e57ead5baba4435f06111885b77656da56719da1fcdcda4993e9cd1a95ef34dcd106ee665f0c347a761e357d2faee089840de3cfb098df87f378f5341543

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEWORDERrefno0992883jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\NEWORDERrefno0992883jpg.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\NEWORDERrefno0992883jpg.exe
      "C:\Users\Admin\AppData\Local\Temp\NEWORDERrefno0992883jpg.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:3144

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3116-4-0x0000000002180000-0x000000000218E000-memory.dmp
    Filesize

    56KB

  • memory/3144-5-0x0000000000401480-mapping.dmp
  • memory/3144-6-0x0000000000401000-0x00000000004FD000-memory.dmp
    Filesize

    1008KB

  • memory/3144-7-0x0000000000560000-0x0000000000660000-memory.dmp
    Filesize

    1024KB

  • memory/3144-8-0x0000000000401000-0x0000000000541000-memory.dmp
    Filesize

    1.2MB