Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-01-2021 06:22

General

  • Target

    EASTEND.doc

  • Size

    299KB

  • MD5

    4ba5af0ca862e168e6be9b311c19d023

  • SHA1

    489c5f20f70391e817a1b2406f164b789094c376

  • SHA256

    91a88238f5b4dc93a3626e9fc6cf1c5e10b5690153bac179606128380fb45142

  • SHA512

    36ee5ddeadf4cb447b52810174173b8919b7ecd93659cf091ba1f5aab79618b4a416807b3feb6e42eb7a0a2e19e5d63dcbfb412cd54245e04afe535c3f4213e9

Malware Config

Extracted

Family

remcos

C2

gsyagvxnzmkoplbhduisbagtevcnxmzlopljdgye.ydns.eu:2177

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 6 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 86 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\EASTEND.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1340
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\AppData\Roaming\JAK.exe
      C:\Users\Admin\AppData\Roaming\JAK.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1112
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1372
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1664
      • C:\Users\Admin\AppData\Roaming\JAK.exe
        "C:\Users\Admin\AppData\Roaming\JAK.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1056
            • C:\Users\Admin\AppData\Roaming\win.exe
              C:\Users\Admin\AppData\Roaming\win.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1156
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:692
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:1880
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:960
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:1868
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout 1
                7⤵
                  PID:1336
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout 1
                    8⤵
                    • Delays execution with timeout.exe
                    PID:1660
                • C:\Users\Admin\AppData\Roaming\win.exe
                  "C:\Users\Admin\AppData\Roaming\win.exe"
                  7⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetWindowsHookEx
                  PID:1844

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs
      MD5

      4a74e626596d6e66b4bbc59ee6848f2d

      SHA1

      047849ac8735ecc0943428c7cd5e00b52eee06ed

      SHA256

      98bd6dc219a7a3e04d3d67bbec9f0b4d4640831a3a6be0a0078b050041088b0e

      SHA512

      1cd943482d0f1ce2ffaf6ee4a82895e4d57c52051bb14bbda0548cf072b4c5cbe719d2cdb549b5ae7c0241dd9c68dd9d1674acd26aed684b8145500079cc5403

    • C:\Users\Admin\AppData\Roaming\JAK.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • C:\Users\Admin\AppData\Roaming\JAK.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • C:\Users\Admin\AppData\Roaming\JAK.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • C:\Users\Admin\AppData\Roaming\win.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • C:\Users\Admin\AppData\Roaming\win.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • C:\Users\Admin\AppData\Roaming\win.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • \Users\Admin\AppData\Roaming\JAK.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • \Users\Admin\AppData\Roaming\JAK.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • \Users\Admin\AppData\Roaming\win.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • \Users\Admin\AppData\Roaming\win.exe
      MD5

      140dad8ce059a70557bac14f9a3c27ec

      SHA1

      24448bacf3d60298271a4ba5b8d1a0691077a94e

      SHA256

      ceff53de4e1a493db5485f8281c011a98df2c5baa4ac0f8b18757f97501bd48a

      SHA512

      1a3cf7c55530ffd9d2c1342a318ac5405febe11ca972b26611c1d62bc13144be4ffdb94871c564a6a331771f62f50dd11868fcfc4a594a6159fb90cee223b1f0

    • memory/316-27-0x0000000000000000-mapping.dmp
    • memory/664-5-0x0000000076691000-0x0000000076693000-memory.dmp
      Filesize

      8KB

    • memory/692-42-0x0000000000000000-mapping.dmp
    • memory/960-44-0x0000000000000000-mapping.dmp
    • memory/1044-19-0x0000000000000000-mapping.dmp
    • memory/1056-31-0x0000000000000000-mapping.dmp
    • memory/1104-16-0x0000000000000000-mapping.dmp
    • memory/1112-18-0x0000000000000000-mapping.dmp
    • memory/1156-38-0x0000000000E30000-0x0000000000E31000-memory.dmp
      Filesize

      4KB

    • memory/1156-35-0x0000000000000000-mapping.dmp
    • memory/1156-41-0x0000000004850000-0x0000000004851000-memory.dmp
      Filesize

      4KB

    • memory/1156-37-0x000000006B210000-0x000000006B8FE000-memory.dmp
      Filesize

      6.9MB

    • memory/1336-46-0x0000000000000000-mapping.dmp
    • memory/1340-3-0x0000000070651000-0x0000000070653000-memory.dmp
      Filesize

      8KB

    • memory/1340-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1340-2-0x0000000072BD1000-0x0000000072BD4000-memory.dmp
      Filesize

      12KB

    • memory/1372-20-0x0000000000000000-mapping.dmp
    • memory/1540-6-0x000007FEF7D20000-0x000007FEF7F9A000-memory.dmp
      Filesize

      2.5MB

    • memory/1660-30-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1660-47-0x0000000000000000-mapping.dmp
    • memory/1660-24-0x0000000000413FA4-mapping.dmp
    • memory/1660-23-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1664-22-0x0000000000000000-mapping.dmp
    • memory/1844-52-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1844-49-0x0000000000413FA4-mapping.dmp
    • memory/1848-21-0x0000000000000000-mapping.dmp
    • memory/1868-45-0x0000000000000000-mapping.dmp
    • memory/1876-9-0x0000000000000000-mapping.dmp
    • memory/1876-12-0x000000006B600000-0x000000006BCEE000-memory.dmp
      Filesize

      6.9MB

    • memory/1876-13-0x0000000000940000-0x0000000000941000-memory.dmp
      Filesize

      4KB

    • memory/1876-15-0x0000000000290000-0x00000000002C0000-memory.dmp
      Filesize

      192KB

    • memory/1876-17-0x0000000004300000-0x0000000004301000-memory.dmp
      Filesize

      4KB

    • memory/1880-43-0x0000000000000000-mapping.dmp