Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-01-2021 19:03

General

  • Target

    Quote#SO2021010197.pdf.exe

  • Size

    1.5MB

  • MD5

    104064d4c0b681c9a7ae1f0c00fbff49

  • SHA1

    af273bc182f0c492520811da54165534dcf89967

  • SHA256

    5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

  • SHA512

    2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

Malware Config

Extracted

Family

remcos

C2

91.193.75.185:1989

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 4 IoCs
  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Quote#SO2021010197.pdf.exe"
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2868
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2100
            • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
              C:\Users\Admin\AppData\Roaming\Programs\system32.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2196
              • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
                7⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Drops startup file
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2320
                • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                  "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1680
                • C:\Users\Admin\AppData\Roaming\Programs\system32.exe
                  "C:\Users\Admin\AppData\Roaming\Programs\system32.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1624
                  • C:\Windows\SysWOW64\svchost.exe
                    C:\Windows\SysWOW64\svchost.exe
                    9⤵
                      PID:3224

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote#SO2021010197.pdf.exe.log

      MD5

      cad4f330a51860cdfed450ef21cb6e4e

      SHA1

      c4c74c51d71480fd0b28b445cb8dfecb338e29a1

      SHA256

      f8d51a4b0a2afcb5146bd405a1d8d54bba74140d2d1dac582ec3d3f7ed340820

      SHA512

      c40641ae2b28aa8a5f7f0a6b5904e6e362b9a8e5e9cecae85615ab9043e296682e314a0dd6559edeba7f76ae67ff21614f31a3ca1a0d45b038f93c9cdcc36fe1

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\system32.exe.log

      MD5

      cad4f330a51860cdfed450ef21cb6e4e

      SHA1

      c4c74c51d71480fd0b28b445cb8dfecb338e29a1

      SHA256

      f8d51a4b0a2afcb5146bd405a1d8d54bba74140d2d1dac582ec3d3f7ed340820

      SHA512

      c40641ae2b28aa8a5f7f0a6b5904e6e362b9a8e5e9cecae85615ab9043e296682e314a0dd6559edeba7f76ae67ff21614f31a3ca1a0d45b038f93c9cdcc36fe1

    • C:\Users\Admin\AppData\Local\Temp\install.vbs

      MD5

      139d1ffe3f418f4794b6359f239089a2

      SHA1

      579f8d9c97105a2a77566de7e802a26e4a27f4c8

      SHA256

      7c71958fda4cff7e2ae1d9309cd4c0143057ca52732926f640252fd5a7a9a2ca

      SHA512

      5b806812558c28ea195326cfe800a2a41377d5e1da1fb352c2aa3d5060237a5ba544dec6f52459a9ecf55b526280c7d9c6aa8a1b8544124b288a4235eb25c2d9

    • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

      MD5

      104064d4c0b681c9a7ae1f0c00fbff49

      SHA1

      af273bc182f0c492520811da54165534dcf89967

      SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

      SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

      MD5

      104064d4c0b681c9a7ae1f0c00fbff49

      SHA1

      af273bc182f0c492520811da54165534dcf89967

      SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

      SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

      MD5

      104064d4c0b681c9a7ae1f0c00fbff49

      SHA1

      af273bc182f0c492520811da54165534dcf89967

      SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

      SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

      MD5

      104064d4c0b681c9a7ae1f0c00fbff49

      SHA1

      af273bc182f0c492520811da54165534dcf89967

      SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

      SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • C:\Users\Admin\AppData\Roaming\Programs\system32.exe

      MD5

      104064d4c0b681c9a7ae1f0c00fbff49

      SHA1

      af273bc182f0c492520811da54165534dcf89967

      SHA256

      5705f860865c9fd9eb6a5609d3ea183b201e72fa45db0b06be00a4a6f665f82a

      SHA512

      2e3f19c02580d678c1726b6840cf4e31c1abe5d393f7ca773a934a7ecf2bff1fdc055c60a5b4eec99338a72641aa20c7fbd5e1ad78ec6b29e72ea55fa381b225

    • memory/644-2-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/644-9-0x00000000059D0000-0x00000000059D1000-memory.dmp

      Filesize

      4KB

    • memory/644-8-0x0000000003250000-0x0000000003251000-memory.dmp

      Filesize

      4KB

    • memory/644-18-0x0000000003260000-0x0000000003261000-memory.dmp

      Filesize

      4KB

    • memory/644-7-0x0000000001930000-0x0000000001931000-memory.dmp

      Filesize

      4KB

    • memory/644-6-0x0000000005770000-0x0000000005771000-memory.dmp

      Filesize

      4KB

    • memory/644-5-0x0000000005BD0000-0x0000000005BD1000-memory.dmp

      Filesize

      4KB

    • memory/644-3-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/1624-52-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/1624-50-0x0000000000413FA4-mapping.dmp

    • memory/1944-22-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/1944-21-0x0000000000413FA4-mapping.dmp

    • memory/1944-20-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2100-25-0x0000000000000000-mapping.dmp

    • memory/2196-26-0x0000000000000000-mapping.dmp

    • memory/2196-29-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/2196-36-0x0000000004E90000-0x0000000004E91000-memory.dmp

      Filesize

      4KB

    • memory/2320-38-0x0000000010033B7E-mapping.dmp

    • memory/2320-41-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/2320-47-0x0000000005AD0000-0x0000000005AD1000-memory.dmp

      Filesize

      4KB

    • memory/2868-23-0x0000000000000000-mapping.dmp

    • memory/2932-19-0x0000000004D40000-0x0000000004D41000-memory.dmp

      Filesize

      4KB

    • memory/2932-13-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/2932-11-0x0000000010033B7E-mapping.dmp

    • memory/2932-10-0x0000000010000000-0x0000000010038000-memory.dmp

      Filesize

      224KB