Analysis

  • max time kernel
    149s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 12:42

General

  • Target

    Pagos-133, 195 & 285/Documento de Pago/Pago-285.exe

  • Size

    909KB

  • MD5

    9768933afbf8fc3321fabe7ef5b8b140

  • SHA1

    33c36facdb8b28dd8f63c86c7c65af9899203212

  • SHA256

    b06ee4f0f1e474a53678998bb8c66b7e8b516b56ee017915963f09821bc55ca4

  • SHA512

    7066f5ac68ff7a6e622d98f3caf2cab5c3484748ffd188cd875cf632c9da4f9bf4592a883a7abffa88609bb0b7fde8bbf0f4381d023edb5df50b59a6488edfdf

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.azebal.com
  • Port:
    587
  • Username:
    kimone@azebal.com
  • Password:
    #*ehEFidm0

Extracted

Family

remcos

Version

3.1.5 Pro

Botnet

RemoteHost

C2

ramzy.duckdns.org:2005

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    agent.exe

  • copy_folder

    Remcos

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-RV1M2P

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Extracted

Family

xloader

Version

2.3

C2

http://www.northriverlawns.com/q3t0/

Decoy

xn--n8jh0ox33v9th.club

realestateactiongroup.com

theblackcottage.com

iptvfresh.com

firstseviceresidential.com

enhancemarketingsolutions.com

matchawali.com

lockedselfstorage.com

laurencervera.com

waffleicionados.com

ryanplumbingandmechanical.com

mahalabartlemathiassen.com

enter-flowers.com

berlinclick.com

pop.direct

dangeranimalsfounded.press

sweetwhiskerscreamery.com

acaciamultimedia.com

thejoyfulmark.com

bspceducation.com

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • Nirsoft 2 IoCs
  • Xloader Payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
      "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
        "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Users\Admin\AppData\Local\Temp\edwn.exe
          "C:\Users\Admin\AppData\Local\Temp\edwn.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Users\Admin\AppData\Local\Temp\edwn.exe
            "C:\Users\Admin\AppData\Local\Temp\edwn.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1008
        • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
          "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe"
          4⤵
            PID:1120
          • C:\Users\Admin\AppData\Roaming\ubin.exe
            "C:\Users\Admin\AppData\Roaming\ubin.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1592
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              "C:\Users\Admin\AppData\Roaming\ubin.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1992
              • C:\Windows\SysWOW64\netsh.exe
                "netsh" wlan show profile
                6⤵
                  PID:964
            • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
              "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe"
              4⤵
                PID:816
              • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
                "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe"
                4⤵
                  PID:1952
                • C:\Users\Admin\AppData\Roaming\rirrin.exe
                  "C:\Users\Admin\AppData\Roaming\rirrin.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  PID:1052
                  • C:\Users\Admin\AppData\Roaming\rirrin.exe
                    "C:\Users\Admin\AppData\Roaming\rirrin.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1420
                • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
                  "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe" /stext "C:\Users\Admin\AppData\Local\Temp\rqzjkhrvimmcknoqbrlkk"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1712
                • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
                  "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe" /stext "C:\Users\Admin\AppData\Local\Temp\bkeblacowuehmtkukcxlvwvk"
                  4⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:520
                • C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe
                  "C:\Users\Admin\AppData\Local\Temp\Pagos-133, 195 & 285\Documento de Pago\Pago-285.exe" /stext "C:\Users\Admin\AppData\Local\Temp\lnjmmsmqkcwtwzygbnsnxbqbcxt"
                  4⤵
                    PID:1480
              • C:\Windows\SysWOW64\colorcpl.exe
                "C:\Windows\SysWOW64\colorcpl.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1484
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\edwn.exe"
                  3⤵
                    PID:1840

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              1
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\edwn.exe
                MD5

                19c2392c2e001978c60b57a9b8845f82

                SHA1

                28f30ef8b0c4faaee1ae9a513847951a92ee4c2e

                SHA256

                e97c9ed01a735584d220b31055326fc67542a655a631ec2f69df688e104cac51

                SHA512

                e56c0429127cb1eaf95327dfa034560173618bd5718afec8211692d896c76c7dea8b1e3da7ab66fa73aa6e2aa61f4527da02f06e8b776a22d717be29f755ad6b

              • C:\Users\Admin\AppData\Local\Temp\edwn.exe
                MD5

                19c2392c2e001978c60b57a9b8845f82

                SHA1

                28f30ef8b0c4faaee1ae9a513847951a92ee4c2e

                SHA256

                e97c9ed01a735584d220b31055326fc67542a655a631ec2f69df688e104cac51

                SHA512

                e56c0429127cb1eaf95327dfa034560173618bd5718afec8211692d896c76c7dea8b1e3da7ab66fa73aa6e2aa61f4527da02f06e8b776a22d717be29f755ad6b

              • C:\Users\Admin\AppData\Local\Temp\edwn.exe
                MD5

                19c2392c2e001978c60b57a9b8845f82

                SHA1

                28f30ef8b0c4faaee1ae9a513847951a92ee4c2e

                SHA256

                e97c9ed01a735584d220b31055326fc67542a655a631ec2f69df688e104cac51

                SHA512

                e56c0429127cb1eaf95327dfa034560173618bd5718afec8211692d896c76c7dea8b1e3da7ab66fa73aa6e2aa61f4527da02f06e8b776a22d717be29f755ad6b

              • C:\Users\Admin\AppData\Local\Temp\rqzjkhrvimmcknoqbrlkk
                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • C:\Users\Admin\AppData\Roaming\rirrin.exe
                MD5

                6872f26ea6bc80857dd1370850d296ba

                SHA1

                d1ec543655af9bbfea4d10b789d9359ff945f26f

                SHA256

                f67eff8ffdda0086583641bd46fcd65db2a722fb99d45212efc18667cb36bbda

                SHA512

                469b9fd9e9eff656151e79be42ad27e7502362cb457365a2fe9b5d5a2d0cab3cae903be4ec18a36cec103c9f5740738c9ff06bba62f9ae76b3d8e106368190ff

              • C:\Users\Admin\AppData\Roaming\rirrin.exe
                MD5

                6872f26ea6bc80857dd1370850d296ba

                SHA1

                d1ec543655af9bbfea4d10b789d9359ff945f26f

                SHA256

                f67eff8ffdda0086583641bd46fcd65db2a722fb99d45212efc18667cb36bbda

                SHA512

                469b9fd9e9eff656151e79be42ad27e7502362cb457365a2fe9b5d5a2d0cab3cae903be4ec18a36cec103c9f5740738c9ff06bba62f9ae76b3d8e106368190ff

              • C:\Users\Admin\AppData\Roaming\rirrin.exe
                MD5

                6872f26ea6bc80857dd1370850d296ba

                SHA1

                d1ec543655af9bbfea4d10b789d9359ff945f26f

                SHA256

                f67eff8ffdda0086583641bd46fcd65db2a722fb99d45212efc18667cb36bbda

                SHA512

                469b9fd9e9eff656151e79be42ad27e7502362cb457365a2fe9b5d5a2d0cab3cae903be4ec18a36cec103c9f5740738c9ff06bba62f9ae76b3d8e106368190ff

              • C:\Users\Admin\AppData\Roaming\ubin.exe
                MD5

                567dd1c90a863471e1aa531631fa4709

                SHA1

                2f5ad63cd05303ba4e863c1a540ce23defbe1007

                SHA256

                fcda57289a27871aecb74773cd675ff7f95e428bebad964ab4c2c0a7c5dd5e2d

                SHA512

                f68af9972c6406293e9bd34a031b246000c01e8b13e602c7cc479c6b2ad069d19fcb5f32a25c4e71b5e9b186de90654fc44e1a4c916353d74446d3b5b3ded437

              • C:\Users\Admin\AppData\Roaming\ubin.exe
                MD5

                567dd1c90a863471e1aa531631fa4709

                SHA1

                2f5ad63cd05303ba4e863c1a540ce23defbe1007

                SHA256

                fcda57289a27871aecb74773cd675ff7f95e428bebad964ab4c2c0a7c5dd5e2d

                SHA512

                f68af9972c6406293e9bd34a031b246000c01e8b13e602c7cc479c6b2ad069d19fcb5f32a25c4e71b5e9b186de90654fc44e1a4c916353d74446d3b5b3ded437

              • \Users\Admin\AppData\Local\Temp\edwn.exe
                MD5

                19c2392c2e001978c60b57a9b8845f82

                SHA1

                28f30ef8b0c4faaee1ae9a513847951a92ee4c2e

                SHA256

                e97c9ed01a735584d220b31055326fc67542a655a631ec2f69df688e104cac51

                SHA512

                e56c0429127cb1eaf95327dfa034560173618bd5718afec8211692d896c76c7dea8b1e3da7ab66fa73aa6e2aa61f4527da02f06e8b776a22d717be29f755ad6b

              • \Users\Admin\AppData\Local\Temp\edwn.exe
                MD5

                19c2392c2e001978c60b57a9b8845f82

                SHA1

                28f30ef8b0c4faaee1ae9a513847951a92ee4c2e

                SHA256

                e97c9ed01a735584d220b31055326fc67542a655a631ec2f69df688e104cac51

                SHA512

                e56c0429127cb1eaf95327dfa034560173618bd5718afec8211692d896c76c7dea8b1e3da7ab66fa73aa6e2aa61f4527da02f06e8b776a22d717be29f755ad6b

              • \Users\Admin\AppData\Roaming\rirrin.exe
                MD5

                6872f26ea6bc80857dd1370850d296ba

                SHA1

                d1ec543655af9bbfea4d10b789d9359ff945f26f

                SHA256

                f67eff8ffdda0086583641bd46fcd65db2a722fb99d45212efc18667cb36bbda

                SHA512

                469b9fd9e9eff656151e79be42ad27e7502362cb457365a2fe9b5d5a2d0cab3cae903be4ec18a36cec103c9f5740738c9ff06bba62f9ae76b3d8e106368190ff

              • \Users\Admin\AppData\Roaming\ubin.exe
                MD5

                567dd1c90a863471e1aa531631fa4709

                SHA1

                2f5ad63cd05303ba4e863c1a540ce23defbe1007

                SHA256

                fcda57289a27871aecb74773cd675ff7f95e428bebad964ab4c2c0a7c5dd5e2d

                SHA512

                f68af9972c6406293e9bd34a031b246000c01e8b13e602c7cc479c6b2ad069d19fcb5f32a25c4e71b5e9b186de90654fc44e1a4c916353d74446d3b5b3ded437

              • memory/268-64-0x0000000000000000-mapping.dmp
              • memory/268-71-0x0000000000130000-0x0000000000132000-memory.dmp
                Filesize

                8KB

              • memory/520-119-0x0000000000422206-mapping.dmp
              • memory/520-117-0x0000000000400000-0x0000000000424000-memory.dmp
                Filesize

                144KB

              • memory/520-128-0x0000000000400000-0x0000000000424000-memory.dmp
                Filesize

                144KB

              • memory/816-100-0x0000000000230000-0x0000000000232000-memory.dmp
                Filesize

                8KB

              • memory/816-99-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/816-93-0x0000000000401000-mapping.dmp
              • memory/816-92-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/964-131-0x0000000000000000-mapping.dmp
              • memory/1008-69-0x000000000041D080-mapping.dmp
              • memory/1008-77-0x00000000002F0000-0x0000000000301000-memory.dmp
                Filesize

                68KB

              • memory/1008-72-0x0000000000400000-0x0000000000429000-memory.dmp
                Filesize

                164KB

              • memory/1008-76-0x0000000000800000-0x0000000000B03000-memory.dmp
                Filesize

                3.0MB

              • memory/1052-124-0x0000000000230000-0x0000000000232000-memory.dmp
                Filesize

                8KB

              • memory/1052-107-0x0000000000000000-mapping.dmp
              • memory/1084-62-0x0000000000400000-0x0000000000479000-memory.dmp
                Filesize

                484KB

              • memory/1084-59-0x000000000042F075-mapping.dmp
              • memory/1084-60-0x0000000075D41000-0x0000000075D43000-memory.dmp
                Filesize

                8KB

              • memory/1120-73-0x0000000000400000-0x0000000000447000-memory.dmp
                Filesize

                284KB

              • memory/1120-74-0x0000000000401000-mapping.dmp
              • memory/1120-80-0x00000000001C0000-0x00000000001C2000-memory.dmp
                Filesize

                8KB

              • memory/1120-79-0x0000000000400000-0x0000000000447000-memory.dmp
                Filesize

                284KB

              • memory/1220-135-0x0000000003E30000-0x0000000003EC3000-memory.dmp
                Filesize

                588KB

              • memory/1220-78-0x0000000006AA0000-0x0000000006C15000-memory.dmp
                Filesize

                1.5MB

              • memory/1420-111-0x0000000000405944-mapping.dmp
              • memory/1420-125-0x0000000000400000-0x00000000004BE000-memory.dmp
                Filesize

                760KB

              • memory/1480-120-0x0000000000400000-0x0000000000457000-memory.dmp
                Filesize

                348KB

              • memory/1480-126-0x0000000000400000-0x0000000000457000-memory.dmp
                Filesize

                348KB

              • memory/1480-122-0x0000000000455238-mapping.dmp
              • memory/1484-96-0x0000000000B30000-0x0000000000B48000-memory.dmp
                Filesize

                96KB

              • memory/1484-97-0x0000000000080000-0x00000000000A9000-memory.dmp
                Filesize

                164KB

              • memory/1484-90-0x0000000000000000-mapping.dmp
              • memory/1484-130-0x0000000000800000-0x0000000000890000-memory.dmp
                Filesize

                576KB

              • memory/1484-98-0x0000000001F50000-0x0000000002253000-memory.dmp
                Filesize

                3.0MB

              • memory/1592-82-0x0000000000000000-mapping.dmp
              • memory/1592-88-0x0000000000080000-0x0000000000082000-memory.dmp
                Filesize

                8KB

              • memory/1712-127-0x0000000000400000-0x0000000000478000-memory.dmp
                Filesize

                480KB

              • memory/1712-116-0x0000000000476274-mapping.dmp
              • memory/1712-115-0x0000000000400000-0x0000000000478000-memory.dmp
                Filesize

                480KB

              • memory/1840-95-0x0000000000000000-mapping.dmp
              • memory/1952-101-0x0000000000400000-0x0000000000473000-memory.dmp
                Filesize

                460KB

              • memory/1952-104-0x0000000000400000-0x0000000000473000-memory.dmp
                Filesize

                460KB

              • memory/1952-102-0x0000000000401000-mapping.dmp
              • memory/1952-105-0x0000000000230000-0x0000000000232000-memory.dmp
                Filesize

                8KB

              • memory/1992-86-0x0000000000443BDE-mapping.dmp
              • memory/1992-89-0x0000000002070000-0x0000000002071000-memory.dmp
                Filesize

                4KB

              • memory/1992-133-0x0000000002071000-0x0000000002072000-memory.dmp
                Filesize

                4KB

              • memory/1992-134-0x0000000002076000-0x0000000002087000-memory.dmp
                Filesize

                68KB

              • memory/2040-61-0x00000000002D0000-0x00000000002D2000-memory.dmp
                Filesize

                8KB