Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 14:50
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice.exe
Resource
win7v20210408
General
-
Target
Payment_Advice.exe
-
Size
1.4MB
-
MD5
90d299316fdd9e9131b1316f8c05a7c2
-
SHA1
d7728c0d419b36b00f02bd470034d00bcb9f3564
-
SHA256
5fa4dc80cabd644491180f4af2bbe0001bf4082fe84b45e1452200318b912aee
-
SHA512
ed6745baa0074c969df3b33f758418192438e42024a6ea34e7a05260ea5ff0607343c241f2e8e038a3489b9b20a27d0ad4dbe5658760b9ec7f7544489b18b2ab
Malware Config
Extracted
remcos
3.1.5 Pro
SA
ego.ddns.net:2404
chasesure.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
rem.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-6KPFIK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rem.exerem.exepid process 820 rem.exe 872 rem.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Payment_Advice.exerem.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Payment_Advice.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\rem.exe\"" Payment_Advice.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rem.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\rem.exe\"" rem.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Payment_Advice.exerem.exedescription pid process target process PID 516 set thread context of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 820 set thread context of 872 820 rem.exe rem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3312 schtasks.exe 3976 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
Payment_Advice.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings Payment_Advice.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rem.exepid process 872 rem.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
Payment_Advice.exePayment_Advice.exeWScript.execmd.exerem.exedescription pid process target process PID 516 wrote to memory of 3312 516 Payment_Advice.exe schtasks.exe PID 516 wrote to memory of 3312 516 Payment_Advice.exe schtasks.exe PID 516 wrote to memory of 3312 516 Payment_Advice.exe schtasks.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 516 wrote to memory of 3468 516 Payment_Advice.exe Payment_Advice.exe PID 3468 wrote to memory of 4084 3468 Payment_Advice.exe WScript.exe PID 3468 wrote to memory of 4084 3468 Payment_Advice.exe WScript.exe PID 3468 wrote to memory of 4084 3468 Payment_Advice.exe WScript.exe PID 4084 wrote to memory of 4004 4084 WScript.exe cmd.exe PID 4084 wrote to memory of 4004 4084 WScript.exe cmd.exe PID 4084 wrote to memory of 4004 4084 WScript.exe cmd.exe PID 4004 wrote to memory of 820 4004 cmd.exe rem.exe PID 4004 wrote to memory of 820 4004 cmd.exe rem.exe PID 4004 wrote to memory of 820 4004 cmd.exe rem.exe PID 820 wrote to memory of 3976 820 rem.exe schtasks.exe PID 820 wrote to memory of 3976 820 rem.exe schtasks.exe PID 820 wrote to memory of 3976 820 rem.exe schtasks.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe PID 820 wrote to memory of 872 820 rem.exe rem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eOTbmoGKVPV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6C57.tmp"2⤵
- Creates scheduled task(s)
PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\rem.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Roaming\Remcos\rem.exeC:\Users\Admin\AppData\Roaming\Remcos\rem.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eOTbmoGKVPV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4D70.tmp"6⤵
- Creates scheduled task(s)
PID:3976
-
-
C:\Users\Admin\AppData\Roaming\Remcos\rem.exe"C:\Users\Admin\AppData\Roaming\Remcos\rem.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ee6a60642b38818164df4cc6559b10e1
SHA1896228860c3c87913c136ac5381732055bd7c683
SHA2566b8f524f0c489f90c21422804ff6da3729d9f38cdaf99abd83302c856badd478
SHA512a507173b14f0fe59f4a9d993b7afb1eb66a696a149d22ff3d15b7013977b5a1302ad4f578a28e22d1960c8b793d9f7952ce64e3f9d2c4a056cabce97d69baad1
-
MD5
559c35dc8db3867ef13927d82cdeb345
SHA13f03ca5ebde82493b5c6d5659cb654746c305d92
SHA256932fe9fa2df79594c47bebd1536aeed284465c55f43b35753e098dce596189ef
SHA5127b29241a9de265c1e1f29e7e6a691cc9ccf083faf96df057b79e2187aed44a8f24e1aad9e5afc0677f70f110720164b3a97043b78090630bd25ae1324aeace5d
-
MD5
559c35dc8db3867ef13927d82cdeb345
SHA13f03ca5ebde82493b5c6d5659cb654746c305d92
SHA256932fe9fa2df79594c47bebd1536aeed284465c55f43b35753e098dce596189ef
SHA5127b29241a9de265c1e1f29e7e6a691cc9ccf083faf96df057b79e2187aed44a8f24e1aad9e5afc0677f70f110720164b3a97043b78090630bd25ae1324aeace5d
-
MD5
90d299316fdd9e9131b1316f8c05a7c2
SHA1d7728c0d419b36b00f02bd470034d00bcb9f3564
SHA2565fa4dc80cabd644491180f4af2bbe0001bf4082fe84b45e1452200318b912aee
SHA512ed6745baa0074c969df3b33f758418192438e42024a6ea34e7a05260ea5ff0607343c241f2e8e038a3489b9b20a27d0ad4dbe5658760b9ec7f7544489b18b2ab
-
MD5
90d299316fdd9e9131b1316f8c05a7c2
SHA1d7728c0d419b36b00f02bd470034d00bcb9f3564
SHA2565fa4dc80cabd644491180f4af2bbe0001bf4082fe84b45e1452200318b912aee
SHA512ed6745baa0074c969df3b33f758418192438e42024a6ea34e7a05260ea5ff0607343c241f2e8e038a3489b9b20a27d0ad4dbe5658760b9ec7f7544489b18b2ab
-
MD5
90d299316fdd9e9131b1316f8c05a7c2
SHA1d7728c0d419b36b00f02bd470034d00bcb9f3564
SHA2565fa4dc80cabd644491180f4af2bbe0001bf4082fe84b45e1452200318b912aee
SHA512ed6745baa0074c969df3b33f758418192438e42024a6ea34e7a05260ea5ff0607343c241f2e8e038a3489b9b20a27d0ad4dbe5658760b9ec7f7544489b18b2ab