Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    23-04-2021 05:51

General

  • Target

    ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe

  • Size

    179KB

  • MD5

    f18ecb4ec01c8696b450b53e255f8e32

  • SHA1

    18e24ceb9004c164db0d204d9ca513b5a64060fa

  • SHA256

    b805f68139469a793d97d7082a7d46a5eedcea8fa39676fd4ce557dae2725fff

  • SHA512

    59f5c4616b17aaeba753318fcffacba71dc76bcc599665e31a50e7d31026ed2edc598bd285b1de9e19a09e9a6987318be3f17cee827a7b7ce2a89e6385d8f36d

Malware Config

Extracted

Family

remcos

C2

databasepropersonombrecomercialideasearchwords.services:3521

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • Nirsoft 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe"
    1⤵
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe" /SpecialRun 4101d8 1296
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2064
    • C:\Users\Admin\AppData\Local\Temp\ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\ADJUNTO_EXTRACTO_57971132761620070018881_09935417206929246064486_21739530852328700789183845_619471746722927151121122_pdf.exe"
      2⤵
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3352
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
            C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
            5⤵
            • Executes dropped EXE
            • Windows security modification
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:416
            • C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe
              "C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2228
              • C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe
                "C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe" /SpecialRun 4101d8 2228
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4016
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe" -Force
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1420
            • C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
              "C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetWindowsHookEx
              PID:424

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

3
T1089

Modify Registry

4
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\2fidKeete159
    MD5

    dee768f4e18ce1c6b628d10e3fd590cc

    SHA1

    9c654c839392e55d028a0587fad5f86edb237b3e

    SHA256

    6ba324573a086fb66b4a40e806ce864b4cc9d4e096ed870bf2addefb11cbf4e7

    SHA512

    9a791b7c033546ca4ad1e9bb2648886b17105775b284d24d690921ff07b5551ba73ecee3137097a8f82122a42719fea72c6e915d838355ad2534aa15a1c2d10f

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    db01a2c1c7e70b2b038edf8ad5ad9826

    SHA1

    540217c647a73bad8d8a79e3a0f3998b5abd199b

    SHA256

    413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

    SHA512

    c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    06d468fa569f1bb9f601d6f034fd482c

    SHA1

    f07fbef22a97a7ad7ec92eea8d20709b042a0e7f

    SHA256

    8f4bff7e9f17fa57ade63e1fa7b59c2f5b5426458468ae764dd1ea7332d06832

    SHA512

    588600505aa6864ca6727d8c4a00d2ecf434ca9fcf3f81bd9f7c20a9b230ab70bb6e722c42a8d9019c27d7a56a55d53d85fd8dbd5e2dafee3aa964af0c417046

  • C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\28012b50-221a-4bd1-8e4a-f90746d586b7\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\9f0f3838-81d3-4984-bd01-6cd2194906dc\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\install.vbs
    MD5

    a39af763b1c09ead3c98a6a615f377fe

    SHA1

    9bd3d39c89e47fe7072270ecc80b810103235c03

    SHA256

    a3930d7535eb768523ee52bbe69f13f857a0ae0f982d7bfc354d802f21010f8f

    SHA512

    3ed8e33ac95fd2536286b4afb2ed2a082bb5f98843478262b32263a14a5dbe0425de7b8d9662a5e482b207ebf8484ace8009ecd1881a6f6f8b0ccf3b0fdfe5da

  • C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
    MD5

    f18ecb4ec01c8696b450b53e255f8e32

    SHA1

    18e24ceb9004c164db0d204d9ca513b5a64060fa

    SHA256

    b805f68139469a793d97d7082a7d46a5eedcea8fa39676fd4ce557dae2725fff

    SHA512

    59f5c4616b17aaeba753318fcffacba71dc76bcc599665e31a50e7d31026ed2edc598bd285b1de9e19a09e9a6987318be3f17cee827a7b7ce2a89e6385d8f36d

  • C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
    MD5

    f18ecb4ec01c8696b450b53e255f8e32

    SHA1

    18e24ceb9004c164db0d204d9ca513b5a64060fa

    SHA256

    b805f68139469a793d97d7082a7d46a5eedcea8fa39676fd4ce557dae2725fff

    SHA512

    59f5c4616b17aaeba753318fcffacba71dc76bcc599665e31a50e7d31026ed2edc598bd285b1de9e19a09e9a6987318be3f17cee827a7b7ce2a89e6385d8f36d

  • C:\Users\Admin\AppData\Roaming\System32\PxxoServicesTrialNet1.exe
    MD5

    f18ecb4ec01c8696b450b53e255f8e32

    SHA1

    18e24ceb9004c164db0d204d9ca513b5a64060fa

    SHA256

    b805f68139469a793d97d7082a7d46a5eedcea8fa39676fd4ce557dae2725fff

    SHA512

    59f5c4616b17aaeba753318fcffacba71dc76bcc599665e31a50e7d31026ed2edc598bd285b1de9e19a09e9a6987318be3f17cee827a7b7ce2a89e6385d8f36d

  • memory/416-203-0x0000000002550000-0x0000000002551000-memory.dmp
    Filesize

    4KB

  • memory/416-194-0x0000000000000000-mapping.dmp
  • memory/424-211-0x0000000000413FA4-mapping.dmp
  • memory/424-213-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/684-190-0x0000000000000000-mapping.dmp
  • memory/736-119-0x0000000005FA0000-0x0000000005FA1000-memory.dmp
    Filesize

    4KB

  • memory/736-114-0x0000000000730000-0x0000000000731000-memory.dmp
    Filesize

    4KB

  • memory/736-116-0x00000000050F0000-0x00000000050F1000-memory.dmp
    Filesize

    4KB

  • memory/736-117-0x0000000005A00000-0x0000000005A01000-memory.dmp
    Filesize

    4KB

  • memory/736-118-0x0000000004B30000-0x0000000004BA0000-memory.dmp
    Filesize

    448KB

  • memory/1296-120-0x0000000000000000-mapping.dmp
  • memory/1420-206-0x00000000046C0000-0x00000000046C1000-memory.dmp
    Filesize

    4KB

  • memory/1420-204-0x0000000000000000-mapping.dmp
  • memory/1420-210-0x00000000046C3000-0x00000000046C4000-memory.dmp
    Filesize

    4KB

  • memory/1420-207-0x00000000046C2000-0x00000000046C3000-memory.dmp
    Filesize

    4KB

  • memory/1420-209-0x000000007EEB0000-0x000000007EEB1000-memory.dmp
    Filesize

    4KB

  • memory/1964-123-0x0000000000000000-mapping.dmp
  • memory/2064-130-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB

  • memory/2064-146-0x0000000009470000-0x00000000094A3000-memory.dmp
    Filesize

    204KB

  • memory/2064-125-0x0000000000000000-mapping.dmp
  • memory/2064-128-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
    Filesize

    4KB

  • memory/2064-161-0x0000000004BB3000-0x0000000004BB4000-memory.dmp
    Filesize

    4KB

  • memory/2064-160-0x000000007F160000-0x000000007F161000-memory.dmp
    Filesize

    4KB

  • memory/2064-159-0x00000000099E0000-0x00000000099E1000-memory.dmp
    Filesize

    4KB

  • memory/2064-129-0x00000000075B0000-0x00000000075B1000-memory.dmp
    Filesize

    4KB

  • memory/2064-158-0x0000000009850000-0x0000000009851000-memory.dmp
    Filesize

    4KB

  • memory/2064-153-0x0000000009450000-0x0000000009451000-memory.dmp
    Filesize

    4KB

  • memory/2064-131-0x0000000004BB2000-0x0000000004BB3000-memory.dmp
    Filesize

    4KB

  • memory/2064-132-0x0000000007C60000-0x0000000007C61000-memory.dmp
    Filesize

    4KB

  • memory/2064-138-0x00000000086F0000-0x00000000086F1000-memory.dmp
    Filesize

    4KB

  • memory/2064-137-0x0000000008410000-0x0000000008411000-memory.dmp
    Filesize

    4KB

  • memory/2064-136-0x00000000082C0000-0x00000000082C1000-memory.dmp
    Filesize

    4KB

  • memory/2064-135-0x0000000007F50000-0x0000000007F51000-memory.dmp
    Filesize

    4KB

  • memory/2064-134-0x0000000007D00000-0x0000000007D01000-memory.dmp
    Filesize

    4KB

  • memory/2064-133-0x0000000007EE0000-0x0000000007EE1000-memory.dmp
    Filesize

    4KB

  • memory/2228-198-0x0000000000000000-mapping.dmp
  • memory/2276-193-0x0000000000000000-mapping.dmp
  • memory/3352-191-0x0000000000400000-0x0000000000422000-memory.dmp
    Filesize

    136KB

  • memory/3352-189-0x0000000000413FA4-mapping.dmp
  • memory/4016-201-0x0000000000000000-mapping.dmp