Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    05-06-2021 01:41

General

  • Target

    SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe

  • Size

    1.1MB

  • MD5

    6ec0ed2ba12675538c2409d012cc3ef3

  • SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

  • SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

  • SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

HostUniversal

C2

bressonseencrounder.mangospot.net:1984

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Office

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    revsr_bwssxphqkv

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

Extracted

Family

warzonerat

C2

seencroundercontroller.webredirect.org:1894

Extracted

Family

nanocore

Version

1.2.2.0

C2

multipleentry90dayscontroller.homingbeacon.net:54980

universalchampionis.zapto.org:54980

Mutex

44548f7d-2f32-414e-b70b-1138f528266a

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    universalchampionis.zapto.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-03-09T23:47:26.614623836Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    54980

  • default_group

    Basi@Manager

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    44548f7d-2f32-414e-b70b-1138f528266a

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    multipleentry90dayscontroller.homingbeacon.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops startup file 2 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:1144
    • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe
      "C:\Users\Admin\AppData\Local\notepadnote\firefox.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1012
    • C:\Windows\firefox\Outlook w.exe
      "C:\Windows\firefox\Outlook w.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3500
    • C:\Users\Admin\AppData\Local\skype\skype n.exe
      "C:\Users\Admin\AppData\Local\skype\skype n.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2208
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1980
      • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
        "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:8

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    a42483a16c0c3231d9610565b3d0c098

    SHA1

    6a316d72ac959b047d77468e12b8a0c71fb369b5

    SHA256

    dbf0b1043ba161f63a38079dc4c7beac174cc538bd253192a3ae031b3d529e34

    SHA512

    83b2b642f9c70b91b1ea33d83b02163d6c29410fb8c2c2c709e8b51886e2cad9c2f1d36e31536645a34d8d5fef0e00bc1270da8aa4396508394012715666f659

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    249cae6e04e6d9f5505c300b52082dcf

    SHA1

    f411b380af3962ee0cf12227ec68870e69fa6369

    SHA256

    93f5ddd69d8397485c8c05664489236a89d5e955fb00dd8790fa0cd54a39e4b8

    SHA512

    2940314ffd5ba952fde127249bcfdae65ed9d2d76955481d65c48017244ebd5346708a06fc86f42d00ed32275f2d6a5f8d78f55a8531b835bfea422e58aa4243

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    5b650520cbec02e3967c0ab6491bd3d8

    SHA1

    02fcc927a384459016cf671e3558e4eb0973e4a8

    SHA256

    7cbb8ae30f666be1f52039d042a1696938516a66d27a08cc6085d073f66a7fed

    SHA512

    a4e802879edd8db4abf9901db9106b9073b7c039d712bb1cb30022d7b3200b1ff35c6f243a6f5c894b5b100892fe18f5acd73189887d8dd925cf022d6738f3f6

  • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • memory/8-181-0x0000000000000000-mapping.dmp

  • memory/764-122-0x0000000006750000-0x0000000006771000-memory.dmp

    Filesize

    132KB

  • memory/764-114-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/764-126-0x0000000005B51000-0x0000000005B52000-memory.dmp

    Filesize

    4KB

  • memory/764-124-0x0000000006720000-0x0000000006721000-memory.dmp

    Filesize

    4KB

  • memory/764-123-0x0000000006890000-0x0000000006891000-memory.dmp

    Filesize

    4KB

  • memory/764-120-0x0000000005B50000-0x0000000005B51000-memory.dmp

    Filesize

    4KB

  • memory/764-119-0x0000000005960000-0x0000000005961000-memory.dmp

    Filesize

    4KB

  • memory/764-118-0x00000000050A0000-0x00000000050A1000-memory.dmp

    Filesize

    4KB

  • memory/764-117-0x0000000005000000-0x0000000005001000-memory.dmp

    Filesize

    4KB

  • memory/764-116-0x0000000005460000-0x0000000005461000-memory.dmp

    Filesize

    4KB

  • memory/1012-128-0x0000000000000000-mapping.dmp

  • memory/1144-127-0x0000000000000000-mapping.dmp

  • memory/1652-168-0x0000000000000000-mapping.dmp

  • memory/1652-171-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/1980-160-0x0000000000A60000-0x0000000000A83000-memory.dmp

    Filesize

    140KB

  • memory/1980-175-0x0000000006910000-0x0000000006916000-memory.dmp

    Filesize

    24KB

  • memory/1980-176-0x0000000006920000-0x0000000006926000-memory.dmp

    Filesize

    24KB

  • memory/1980-163-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/1980-164-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

    Filesize

    4KB

  • memory/1980-166-0x0000000006070000-0x0000000006071000-memory.dmp

    Filesize

    4KB

  • memory/1980-167-0x00000000061A0000-0x00000000061AF000-memory.dmp

    Filesize

    60KB

  • memory/1980-156-0x000000000045A41E-mapping.dmp

  • memory/1980-158-0x0000000000500000-0x0000000000560000-memory.dmp

    Filesize

    384KB

  • memory/1980-174-0x0000000006900000-0x0000000006904000-memory.dmp

    Filesize

    16KB

  • memory/1980-173-0x00000000061C0000-0x00000000061C4000-memory.dmp

    Filesize

    16KB

  • memory/2188-125-0x0000000000000000-mapping.dmp

  • memory/2208-137-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB

  • memory/2208-134-0x0000000000000000-mapping.dmp

  • memory/2532-152-0x0000000005B21000-0x0000000005B22000-memory.dmp

    Filesize

    4KB

  • memory/2532-138-0x0000000000000000-mapping.dmp

  • memory/2532-148-0x0000000005B20000-0x0000000005B21000-memory.dmp

    Filesize

    4KB

  • memory/2532-153-0x00000000069F0000-0x00000000069FB000-memory.dmp

    Filesize

    44KB

  • memory/2532-154-0x0000000009950000-0x0000000009951000-memory.dmp

    Filesize

    4KB

  • memory/3500-131-0x0000000000000000-mapping.dmp