Analysis

  • max time kernel
    101s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-05-2021 11:31

General

  • Target

    Jc7rIzvMGq2Y04X5z29E.exe

  • Size

    1.1MB

  • MD5

    b2ca9a4f140ad9b0c7d4ee5270f80457

  • SHA1

    20a0bc87b558a4c1266f33b12f659f0e298d74cd

  • SHA256

    8ddbf9769d71a2b946894307864aa35aee8afb86a469a6c032b7eaa1225bc720

  • SHA512

    45d9f9c4aa3949cbebf2ccbb34bfc45843c81864cd9c3a510dd12d235b6d841537fcc1fd7749dbaf232bdd42513b4dd1ff9fcb79697f5cb0728f671718bd9996

Score
10/10

Malware Config

Extracted

Family

remcos

C2

style.ptbagasps.co.id:42024

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Jc7rIzvMGq2Y04X5z29E.exe
    "C:\Users\Admin\AppData\Local\Temp\Jc7rIzvMGq2Y04X5z29E.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\SysWOW64\DpiScaling.exe
      C:\Windows\System32\DpiScaling.exe
      2⤵
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xvkrt.vbs"
        3⤵
          PID:2120

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\xvkrt.vbs
      MD5

      be074866409269e44265375472268ac8

      SHA1

      3ce9dd4ec73e549090df35e584489ca2b152baf8

      SHA256

      0611b95ccccd8a80ffff8e37791ef1f18338880c139ccd91795f0343a8cba78e

      SHA512

      10112d322c59501126b9c3a256fbce35f52be00578fc52d004b139fdd0a5555e3e07dfa8a6113e407c7668a9aa795869ed896e1cc30f3f06685825d9fe518d58

    • memory/1116-115-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1116-116-0x000000000042EEEF-mapping.dmp
    • memory/1116-119-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/2120-120-0x0000000000000000-mapping.dmp
    • memory/4060-114-0x0000000000680000-0x00000000007CA000-memory.dmp
      Filesize

      1.3MB