Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-02-2021 15:51

General

  • Target

    6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e.exe

  • Size

    412KB

  • MD5

    3932f812b26f3bff1d20070c58468f2e

  • SHA1

    cbbd717f6fc0efebb051ca6329b90d8473dc5366

  • SHA256

    6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e

  • SHA512

    9b3b414a5552635e111d97b4f3bb458ca778eeaed38b30d9236ff9cd095e9f2e5a28666756e5382adfcaf04b0692b00cec6ea42d984609f1d1f3b2e75377f104

Score
10/10

Malware Config

Extracted

Family

remcos

C2

capriteam.ddns.net:1010

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Users\Admin\AppData\Local\Temp\6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e.exe
      "C:\Users\Admin\AppData\Local\Temp\6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e.exe"
      2⤵
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4016
          • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1568
            • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
              "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:3096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.vbs

    MD5

    abc68e986f1d4fbc3aefa840bc91ddfd

    SHA1

    79acf82b04699262bb74ae2b772a99c1bf68c691

    SHA256

    5b9eedf4b27fc5c907cfae4cd93e54acdff5cb036617c7f9283d8cf3b6c6fb57

    SHA512

    41e219ebcd48bc186773ed5b88c762e4138c8bb60deb0c69afb735d3c42cc66a39cb2b811247ec3929e620222682719db4eac5ce0e6541e9d0c19ac3bd0f1790

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe

    MD5

    3932f812b26f3bff1d20070c58468f2e

    SHA1

    cbbd717f6fc0efebb051ca6329b90d8473dc5366

    SHA256

    6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e

    SHA512

    9b3b414a5552635e111d97b4f3bb458ca778eeaed38b30d9236ff9cd095e9f2e5a28666756e5382adfcaf04b0692b00cec6ea42d984609f1d1f3b2e75377f104

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe

    MD5

    3932f812b26f3bff1d20070c58468f2e

    SHA1

    cbbd717f6fc0efebb051ca6329b90d8473dc5366

    SHA256

    6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e

    SHA512

    9b3b414a5552635e111d97b4f3bb458ca778eeaed38b30d9236ff9cd095e9f2e5a28666756e5382adfcaf04b0692b00cec6ea42d984609f1d1f3b2e75377f104

  • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe

    MD5

    3932f812b26f3bff1d20070c58468f2e

    SHA1

    cbbd717f6fc0efebb051ca6329b90d8473dc5366

    SHA256

    6f0f5ac2a08c4746186a79f3afe48a614b1ed180ce830058805354bfa8cb1e8e

    SHA512

    9b3b414a5552635e111d97b4f3bb458ca778eeaed38b30d9236ff9cd095e9f2e5a28666756e5382adfcaf04b0692b00cec6ea42d984609f1d1f3b2e75377f104

  • memory/496-6-0x0000000000620000-0x0000000000625000-memory.dmp

    Filesize

    20KB

  • memory/496-4-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/1020-9-0x0000000000000000-mapping.dmp

  • memory/1568-12-0x0000000000000000-mapping.dmp

  • memory/2868-8-0x00000000021A0000-0x00000000021A1000-memory.dmp

    Filesize

    4KB

  • memory/2868-7-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/2868-5-0x000000000042ED62-mapping.dmp

  • memory/3096-18-0x000000000042ED62-mapping.dmp

  • memory/3096-21-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3096-22-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/4016-11-0x0000000000000000-mapping.dmp