Analysis

  • max time kernel
    80s
  • max time network
    157s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-06-2021 16:57

General

  • Target

    a24fc1476d5da0d06ebcb6924a02bb18.exe

  • Size

    1.1MB

  • MD5

    a24fc1476d5da0d06ebcb6924a02bb18

  • SHA1

    ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c

  • SHA256

    b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966

  • SHA512

    c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

HostUniversal

C2

bressonseencrounder.mangospot.net:1984

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Office

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    revsr_bwssxphqkv

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

Extracted

Family

warzonerat

C2

seencroundercontroller.webredirect.org:1894

Extracted

Family

nanocore

Version

1.2.2.0

C2

multipleentry90dayscontroller.homingbeacon.net:54980

universalchampionis.zapto.org:54980

Mutex

44548f7d-2f32-414e-b70b-1138f528266a

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    universalchampionis.zapto.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-03-09T23:47:26.614623836Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    54980

  • default_group

    Basi@Manager

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    44548f7d-2f32-414e-b70b-1138f528266a

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    multipleentry90dayscontroller.homingbeacon.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops startup file 3 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a24fc1476d5da0d06ebcb6924a02bb18.exe
    "C:\Users\Admin\AppData\Local\Temp\a24fc1476d5da0d06ebcb6924a02bb18.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe
      "C:\Users\Admin\AppData\Local\notepadnote\firefox.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:808
    • C:\Windows\firefox\Outlook w.exe
      "C:\Windows\firefox\Outlook w.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1568
    • C:\Users\Admin\AppData\Local\skype\skype n.exe
      "C:\Users\Admin\AppData\Local\skype\skype n.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2104
      • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
        "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    4c25911a9183162c7e25a74fc953fa5e

    SHA1

    85acfc6e31cb1bf5df5f7789c231fc6541f91d7e

    SHA256

    d1c665e55c5ce697c992fee27fa7f9d4890c0bc7ea2da612b77e0c2a92e593cc

    SHA512

    2efb2c2d56f2b0d09753d175419569bdacf7ccb9d36a89aa2de633f06e6085a6b7d8c513ae10d8af7e438f4b7c410d42b816db6a3fd3a2db6967891ab47cffeb

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    4fbf938077e27075c22334ed3b24917f

    SHA1

    6a7044ea842947687ed9a9dda157cd348e82b366

    SHA256

    b468f2d9229bdc9dc83a04e0464196024e74a810e106f0b7f58ee21d672b2550

    SHA512

    79e8eecb456594ee7a60dfe21cf23006dae0d6b016fa9c6344cf9c4a0d2c815c524b688a4f5066d3e02316db7f232ce25edaba2551103d1207e2529cfb2bf122

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    a3ae9b593341a98f8bd5df47fc70c5c4

    SHA1

    aac28e3cff2923f80467516bb49ef62009205fe1

    SHA256

    27e12be1bc0fdea1355f9c2f67919db0eea4e76ecc81a131c2dae9151f6273c5

    SHA512

    20a94b47e2f970b3be4f1765c359f61f9ca8168bd3888dba94cc3f29c3bef58e7c9049fff4c4494e8d00969555d8b224a360103f129c077cac4d5a050e4641d6

  • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe

    MD5

    a24fc1476d5da0d06ebcb6924a02bb18

    SHA1

    ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c

    SHA256

    b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966

    SHA512

    c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe

    MD5

    a24fc1476d5da0d06ebcb6924a02bb18

    SHA1

    ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c

    SHA256

    b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966

    SHA512

    c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe

    MD5

    a24fc1476d5da0d06ebcb6924a02bb18

    SHA1

    ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c

    SHA256

    b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966

    SHA512

    c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • memory/808-126-0x0000000000000000-mapping.dmp

  • memory/856-118-0x0000000005860000-0x0000000005861000-memory.dmp

    Filesize

    4KB

  • memory/856-120-0x00000000063D0000-0x00000000063D1000-memory.dmp

    Filesize

    4KB

  • memory/856-125-0x00000000063D1000-0x00000000063D2000-memory.dmp

    Filesize

    4KB

  • memory/856-117-0x0000000005D60000-0x0000000005D61000-memory.dmp

    Filesize

    4KB

  • memory/856-116-0x0000000005780000-0x0000000005781000-memory.dmp

    Filesize

    4KB

  • memory/856-114-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/856-123-0x00000000071F0000-0x00000000071F1000-memory.dmp

    Filesize

    4KB

  • memory/856-124-0x00000000071B0000-0x00000000071B1000-memory.dmp

    Filesize

    4KB

  • memory/856-119-0x0000000005900000-0x0000000005901000-memory.dmp

    Filesize

    4KB

  • memory/856-122-0x00000000063A0000-0x00000000063C1000-memory.dmp

    Filesize

    132KB

  • memory/860-179-0x0000000000000000-mapping.dmp

  • memory/996-171-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/996-166-0x0000000000000000-mapping.dmp

  • memory/1568-129-0x0000000000000000-mapping.dmp

  • memory/2104-154-0x000000000045A41E-mapping.dmp

  • memory/2104-170-0x0000000005B10000-0x0000000005B14000-memory.dmp

    Filesize

    16KB

  • memory/2104-163-0x0000000002A00000-0x0000000002A01000-memory.dmp

    Filesize

    4KB

  • memory/2104-164-0x00000000065C0000-0x00000000065C1000-memory.dmp

    Filesize

    4KB

  • memory/2104-165-0x00000000065F0000-0x00000000065FF000-memory.dmp

    Filesize

    60KB

  • memory/2104-158-0x0000000002A50000-0x0000000002A73000-memory.dmp

    Filesize

    140KB

  • memory/2104-153-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2104-174-0x0000000005B30000-0x0000000005B36000-memory.dmp

    Filesize

    24KB

  • memory/2104-169-0x0000000005B00000-0x0000000005B04000-memory.dmp

    Filesize

    16KB

  • memory/2104-161-0x00000000029F0000-0x00000000029F8000-memory.dmp

    Filesize

    32KB

  • memory/2104-173-0x0000000005B20000-0x0000000005B26000-memory.dmp

    Filesize

    24KB

  • memory/2280-135-0x0000000000BC0000-0x0000000000C6E000-memory.dmp

    Filesize

    696KB

  • memory/2280-132-0x0000000000000000-mapping.dmp

  • memory/3848-151-0x0000000007770000-0x000000000777B000-memory.dmp

    Filesize

    44KB

  • memory/3848-152-0x0000000009DB0000-0x0000000009DB1000-memory.dmp

    Filesize

    4KB

  • memory/3848-150-0x0000000006031000-0x0000000006032000-memory.dmp

    Filesize

    4KB

  • memory/3848-146-0x0000000006030000-0x0000000006031000-memory.dmp

    Filesize

    4KB

  • memory/3848-136-0x0000000000000000-mapping.dmp