Analysis

  • max time kernel
    159s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21-01-2022 23:37

General

  • Target

    35d63d61f12598d5b85475f85cdad05bee0e0afb3c3e65799d1325a224ac66d5.exe

  • Size

    405KB

  • MD5

    607aacf94113248d45f31e2baba4136c

  • SHA1

    7edb738018e0e91c257a6fc94bdba50daf899f90

  • SHA256

    35d63d61f12598d5b85475f85cdad05bee0e0afb3c3e65799d1325a224ac66d5

  • SHA512

    1ebf580afe38f02ccd6eb9b9875e62e610abf8d826595aaba895deffbab65dba61aba6170a34ffeeb81e4f221be4a4c8073db536ca40afd5731214b2961c1763

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.7.0 Pro

Botnet

28 AGOSTO

C2

ruthy.qdp6fj1uji.xyz:2047

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    rcm

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-J3WQVO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d63d61f12598d5b85475f85cdad05bee0e0afb3c3e65799d1325a224ac66d5.exe
    "C:\Users\Admin\AppData\Local\Temp\35d63d61f12598d5b85475f85cdad05bee0e0afb3c3e65799d1325a224ac66d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe Galvanometry,Pickaninny
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2836
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
            PID:2592

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Firebug
      MD5

      4a2aa776c3969ee16131b2ba39be9f88

      SHA1

      55fcc55cbcfdd5bef4d93089aec4945769868258

      SHA256

      5eb32341334c7cde4bec546203b3262a5dbe61754a3178cc7d3771194ad8da4b

      SHA512

      0cff449f3e90e6bf573e9d6f8e495512d6a16d5ef95bdae2f816058f345b4e6935360a0ceb83310664af38b2a2b1ebf5a7ac0b68a43e3819e349a8d225b10bf1

    • C:\Users\Admin\AppData\Local\Temp\Galvanometry.DLL
      MD5

      bc2c79b3780c12c0d508b4fbf37ef15c

      SHA1

      5b2328a38ff40d57c78a8174ebdc9a7f5553c35f

      SHA256

      c0852f62db36c97bb577b840dd58eafd4cd579d09114e2f5c5cbd5858378b598

      SHA512

      9c73429153d6a9b546ff210ec1ef13d2302687992bab26192bb735e9557bec94fc4d6f2ba790afc32933277c1a720cd2015aa19e6522c00150f32fe95cc95136

    • \Users\Admin\AppData\Local\Temp\Galvanometry.dll
      MD5

      bc2c79b3780c12c0d508b4fbf37ef15c

      SHA1

      5b2328a38ff40d57c78a8174ebdc9a7f5553c35f

      SHA256

      c0852f62db36c97bb577b840dd58eafd4cd579d09114e2f5c5cbd5858378b598

      SHA512

      9c73429153d6a9b546ff210ec1ef13d2302687992bab26192bb735e9557bec94fc4d6f2ba790afc32933277c1a720cd2015aa19e6522c00150f32fe95cc95136

    • memory/1820-121-0x0000000073630000-0x00000000736DD000-memory.dmp
      Filesize

      692KB

    • memory/1820-122-0x0000000002EA0000-0x0000000002EA2000-memory.dmp
      Filesize

      8KB

    • memory/1820-123-0x00000000741E0000-0x0000000074247000-memory.dmp
      Filesize

      412KB

    • memory/1820-124-0x00007FFDB2F50000-0x00007FFDB312B000-memory.dmp
      Filesize

      1.9MB

    • memory/2836-125-0x00000000775C9000-0x00000000775CA000-memory.dmp
      Filesize

      4KB

    • memory/2836-131-0x00007FFDB2F50000-0x00007FFDB312B000-memory.dmp
      Filesize

      1.9MB

    • memory/2836-141-0x00000000033C0000-0x00000000033C6000-memory.dmp
      Filesize

      24KB

    • memory/2836-157-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB