Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-01-2021 19:03

General

  • Target

    Quote#SO2021010197.pdf.exe

  • Size

    1.5MB

  • MD5

    104064d4c0b681c9a7ae1f0c00fbff49

  • SHA1

    af273bc182f0c492520811da54165534dcf89967

  • SHA256

    5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

  • SHA512

    2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

Malware Config

Extracted

Family

remcos

C2

91.193.75.185:1989

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 3 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 65 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
        3⤵
          PID:1008
        • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:664
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1460
              • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1840
                • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                  "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
                  7⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Drops startup file
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1804
                  • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                    "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1616
                    • C:\Windows\SysWOW64\svchost.exe
                      C:\Windows\SysWOW64\svchost.exe
                      9⤵
                        PID:1708

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\install.vbs

        MD5

        139d1ffe3f418f4794b6359f239089a2

        SHA1

        579f8d9c97105a2a77566de7e802a26e4a27f4c8

        SHA256

        7c71958fda4cff7e2ae1d9309cd4c0143057ca52732926f640252fd5a7a9a2ca

        SHA512

        5b806812558c28ea195326cfe800a2a41377d5e1da1fb352c2aa3d5060237a5ba544dec6f52459a9ecf55b526280c7d9c6aa8a1b8544124b288a4235eb25c2d9

      • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • \Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • \Users\Admin\AppData\Roaming\Programs\system32.exe

        MD5

        104064d4c0b681c9a7ae1f0c00fbff49

        SHA1

        af273bc182f0c492520811da54165534dcf89967

        SHA256

        5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

        SHA512

        2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

      • memory/664-16-0x0000000000000000-mapping.dmp

      • memory/664-21-0x00000000025D0000-0x00000000025D4000-memory.dmp

        Filesize

        16KB

      • memory/1120-13-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/1120-14-0x0000000000413FA4-mapping.dmp

      • memory/1120-15-0x00000000760C1000-0x00000000760C3000-memory.dmp

        Filesize

        8KB

      • memory/1120-19-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/1152-5-0x0000000004260000-0x0000000004261000-memory.dmp

        Filesize

        4KB

      • memory/1152-2-0x0000000074360000-0x0000000074A4E000-memory.dmp

        Filesize

        6.9MB

      • memory/1152-3-0x00000000009F0000-0x00000000009F1000-memory.dmp

        Filesize

        4KB

      • memory/1152-11-0x00000000004D0000-0x00000000004D1000-memory.dmp

        Filesize

        4KB

      • memory/1460-20-0x0000000000000000-mapping.dmp

      • memory/1616-45-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/1616-40-0x0000000000413FA4-mapping.dmp

      • memory/1708-44-0x000000000055C6BE-mapping.dmp

      • memory/1708-43-0x0000000000400000-0x0000000000580000-memory.dmp

        Filesize

        1.5MB

      • memory/1804-38-0x0000000004E00000-0x0000000004E01000-memory.dmp

        Filesize

        4KB

      • memory/1804-35-0x0000000010000000-0x0000000010038000-memory.dmp

        Filesize

        224KB

      • memory/1804-34-0x00000000742E0000-0x00000000749CE000-memory.dmp

        Filesize

        6.9MB

      • memory/1804-32-0x0000000010033B7E-mapping.dmp

      • memory/1828-12-0x00000000006F0000-0x00000000006F1000-memory.dmp

        Filesize

        4KB

      • memory/1828-9-0x0000000010000000-0x0000000010038000-memory.dmp

        Filesize

        224KB

      • memory/1828-8-0x0000000074360000-0x0000000074A4E000-memory.dmp

        Filesize

        6.9MB

      • memory/1828-7-0x0000000010033B7E-mapping.dmp

      • memory/1828-6-0x0000000010000000-0x0000000010038000-memory.dmp

        Filesize

        224KB

      • memory/1840-30-0x0000000000500000-0x0000000000501000-memory.dmp

        Filesize

        4KB

      • memory/1840-28-0x00000000011B0000-0x00000000011B1000-memory.dmp

        Filesize

        4KB

      • memory/1840-27-0x00000000742E0000-0x00000000749CE000-memory.dmp

        Filesize

        6.9MB

      • memory/1840-25-0x0000000000000000-mapping.dmp