Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    30-04-2021 07:05

General

  • Target

    VESSELS DETAILS.exe

  • Size

    1.9MB

  • MD5

    6db13d623c8337161d1ca3066c352162

  • SHA1

    571a08a4478c6aee97998122b59b8f7f2ba83f78

  • SHA256

    01b1f2041aaba6815657a7a7409a0843868459fa3cabf0c377a83862ac88a27f

  • SHA512

    1164e4b3bf020c4ddcac92d878027fb542937323a922d6ff993c11e23fe737959478eedb9a04e2f121a68aa7827ae704acef7f2bebe4c69efc9dbf4cdb7fef85

Malware Config

Extracted

Family

remcos

C2

64.44.139.178:7200

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 5 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe
    "C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe
      "C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe"
      2⤵
        PID:2800
      • C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe
        "C:\Users\Admin\AppData\Local\Temp\VESSELS DETAILS.exe"
        2⤵
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Users\Admin\AppData\Local\Temp\._cache_VESSELS DETAILS.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_VESSELS DETAILS.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3592
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:692
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1176
              • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                PID:3668
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          3⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:788
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Modifies registry class
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
              5⤵
              • Executes dropped EXE
              PID:3092
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1348

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    4
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      5f72e98442115eb66da8abc96c3ae68d

      SHA1

      aa33377e1a214637b132ac805aef704376ec97c5

      SHA256

      6a27b78dfc13a80e82d04620260cd32423d2ee7c6b9644d2de19fb9b660ecfd4

      SHA512

      9354aacd8b2daf39b93858e8f5aa66801d2a77f73a9cf6ce3d910a8aacfe25aa6a01f8c2e39b05d291bc7b7c62cb100f9bbabc1e400210fb3f177ef828269c21

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      5f72e98442115eb66da8abc96c3ae68d

      SHA1

      aa33377e1a214637b132ac805aef704376ec97c5

      SHA256

      6a27b78dfc13a80e82d04620260cd32423d2ee7c6b9644d2de19fb9b660ecfd4

      SHA512

      9354aacd8b2daf39b93858e8f5aa66801d2a77f73a9cf6ce3d910a8aacfe25aa6a01f8c2e39b05d291bc7b7c62cb100f9bbabc1e400210fb3f177ef828269c21

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      5f72e98442115eb66da8abc96c3ae68d

      SHA1

      aa33377e1a214637b132ac805aef704376ec97c5

      SHA256

      6a27b78dfc13a80e82d04620260cd32423d2ee7c6b9644d2de19fb9b660ecfd4

      SHA512

      9354aacd8b2daf39b93858e8f5aa66801d2a77f73a9cf6ce3d910a8aacfe25aa6a01f8c2e39b05d291bc7b7c62cb100f9bbabc1e400210fb3f177ef828269c21

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • C:\Users\Admin\AppData\Local\Temp\._cache_VESSELS DETAILS.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • C:\Users\Admin\AppData\Local\Temp\._cache_VESSELS DETAILS.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • C:\Users\Admin\AppData\Local\Temp\166nhLzD.xlsm
      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • C:\Users\Admin\AppData\Local\Temp\install.vbs
      MD5

      b92d64fe5b1d1f59df4b738262aea8df

      SHA1

      c8fb1981759c2d9bb2ec91b705985fba5fc7af63

      SHA256

      fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a

      SHA512

      2566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2

    • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
      MD5

      f4e04ce181bf25a30e3d0cb1ce282c9e

      SHA1

      24c0528a9e5c864980657f646ed5bed615291f15

      SHA256

      e969587901730f24d85569f0a5b3fec0be6754c4edb20f9dcea6430e4a0bf4a1

      SHA512

      b3124d0c31be65f5d0d2239513144a2943421362c0b804e0df1f4cc0c47e41f3466be619c17fe88f6a73cc2b6297be893e763b4b2f702adba583fe19e1caed22

    • memory/692-125-0x0000000000000000-mapping.dmp
    • memory/788-127-0x0000000002D10000-0x0000000002D11000-memory.dmp
      Filesize

      4KB

    • memory/788-122-0x0000000000000000-mapping.dmp
    • memory/1176-128-0x0000000000000000-mapping.dmp
    • memory/1348-140-0x00007FF6F2030000-0x00007FF6F55E6000-memory.dmp
      Filesize

      53.7MB

    • memory/1348-149-0x00007FFCB4F40000-0x00007FFCB6E35000-memory.dmp
      Filesize

      31.0MB

    • memory/1348-148-0x00007FFCB6E40000-0x00007FFCB7F2E000-memory.dmp
      Filesize

      16.9MB

    • memory/1348-147-0x00007FFC964C0000-0x00007FFC964D0000-memory.dmp
      Filesize

      64KB

    • memory/1348-144-0x00007FFC964C0000-0x00007FFC964D0000-memory.dmp
      Filesize

      64KB

    • memory/1348-143-0x00007FFC964C0000-0x00007FFC964D0000-memory.dmp
      Filesize

      64KB

    • memory/1348-142-0x00007FFC964C0000-0x00007FFC964D0000-memory.dmp
      Filesize

      64KB

    • memory/1348-141-0x00007FFC964C0000-0x00007FFC964D0000-memory.dmp
      Filesize

      64KB

    • memory/2104-136-0x00000000011E0000-0x00000000011E1000-memory.dmp
      Filesize

      4KB

    • memory/2104-135-0x0000000000400000-0x0000000000534000-memory.dmp
      Filesize

      1.2MB

    • memory/2104-133-0x000000000049AB80-mapping.dmp
    • memory/2816-116-0x000000000049AB80-mapping.dmp
    • memory/2816-120-0x0000000000400000-0x0000000000534000-memory.dmp
      Filesize

      1.2MB

    • memory/2816-121-0x0000000001240000-0x0000000001241000-memory.dmp
      Filesize

      4KB

    • memory/2816-115-0x0000000000400000-0x0000000000534000-memory.dmp
      Filesize

      1.2MB

    • memory/3092-137-0x0000000000000000-mapping.dmp
    • memory/3592-117-0x0000000000000000-mapping.dmp
    • memory/3668-129-0x0000000000000000-mapping.dmp
    • memory/3692-114-0x00000000025D0000-0x00000000025D1000-memory.dmp
      Filesize

      4KB