Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-01-2022 14:19

General

  • Target

    New Tender.exe

  • Size

    1.5MB

  • MD5

    421422ea74c1f97efd4c202ab402210d

  • SHA1

    674045a74cd3c1d54b494e3638ead5bb9d4e421e

  • SHA256

    68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

  • SHA512

    b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

Malware Config

Extracted

Family

remcos

Version

3.2.1 Pro

Botnet

RemoteHost

C2

janeilla.myddns.me:9711

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-SLEDDG

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1841252439:AAFeBNk12wAgfxXFXtqpw50JT4iCgTc-FsM/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • AgentTesla Payload 3 IoCs
  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • Nirsoft 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Stops running service(s) 3 TTPs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Tender.exe
    "C:\Users\Admin\AppData\Local\Temp\New Tender.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\spoolse.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 9
        3⤵
        • Runs ping.exe
        PID:420
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\spoolse.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:1556
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 19 > nul && copy "C:\Users\Admin\AppData\Local\Temp\New Tender.exe" "C:\Users\Admin\AppData\Roaming\spoolse.exe" && ping 127.0.0.1 -n 19 > nul && "C:\Users\Admin\AppData\Roaming\spoolse.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 19
        3⤵
        • Runs ping.exe
        PID:3744
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 19
        3⤵
        • Runs ping.exe
        PID:1284
      • C:\Users\Admin\AppData\Roaming\spoolse.exe
        "C:\Users\Admin\AppData\Roaming\spoolse.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
          "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C sc stop Windefend
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3548
            • C:\Windows\SysWOW64\sc.exe
              sc stop Windefend
              6⤵
                PID:4080
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\wofmxxgkqghcjzvaajpvjtzhfzuohds"
              5⤵
              • Executes dropped EXE
              PID:2736
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\yqlexqrmeozounrejujpmgtqnomxaoqcro"
              5⤵
              • Executes dropped EXE
              PID:3796
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\ikypyi"
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook accounts
              PID:4000
            • C:\Users\Admin\AppData\Roaming\dwn.exe
              "C:\Users\Admin\AppData\Roaming\dwn.exe"
              5⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:3608
          • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
            "C:\Users\Admin\AppData\Local\Temp\spoolSE.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
              "C:\Users\Admin\AppData\Local\Temp\spoolSE.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3200

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Impair Defenses

    1
    T1562

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    2
    T1114

    Impact

    Service Stop

    1
    T1489

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      7c1a244dbef6ffa2dc4f1b34f6b0e98a

      SHA1

      d31fff5fd8dab79297f0d5468ad567547a98b439

      SHA256

      1555f1f16da2167faf0388e13f23934dff627746dfcb1213062c859b4364c1a5

      SHA512

      3358478f829facab1ac1541c1964be6fe0a24060a0a053a4cbf41fa52e6fe0a3562e8da490688a83114fdc95adf5aa7627e9b1f32e1d5adc1ac25a595292cc54

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      0c1b619e1b88fe957056971dd298cec1

      SHA1

      b0076ce0112184b25dd20a1c84e51a0190d842df

      SHA256

      58e9a258ec010c2503fb878243476c2e73daf10eeb4a9cdc864ff8f2c481b375

      SHA512

      4d72380b2179e8dab8f5b451a900a5127abfceb6df40245b3ad04f260b20b543b9eb235a93b843da611687087d3092225b694735d988fa70d36e44819f894cff

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      0c1b619e1b88fe957056971dd298cec1

      SHA1

      b0076ce0112184b25dd20a1c84e51a0190d842df

      SHA256

      58e9a258ec010c2503fb878243476c2e73daf10eeb4a9cdc864ff8f2c481b375

      SHA512

      4d72380b2179e8dab8f5b451a900a5127abfceb6df40245b3ad04f260b20b543b9eb235a93b843da611687087d3092225b694735d988fa70d36e44819f894cff

    • C:\Users\Admin\AppData\Roaming\dwn.exe
      MD5

      51b0c0a91272196870e59acd2e2c88a6

      SHA1

      eea60522132e64e130114efd7547fdac5119ca7f

      SHA256

      7545ad57abfbe482833f8fe9bc6eb10cc4055380ba139300cde4d5aafd179dde

      SHA512

      80f25a9d5ed6c4c7893c1da96017127cfccda6252ce34c5dcceb1c02f03cabe1f2d3ad976cc2b8c8f98710c3813ece735656bfb9d5407694214a83955dd25f59

    • C:\Users\Admin\AppData\Roaming\dwn.exe
      MD5

      51b0c0a91272196870e59acd2e2c88a6

      SHA1

      eea60522132e64e130114efd7547fdac5119ca7f

      SHA256

      7545ad57abfbe482833f8fe9bc6eb10cc4055380ba139300cde4d5aafd179dde

      SHA512

      80f25a9d5ed6c4c7893c1da96017127cfccda6252ce34c5dcceb1c02f03cabe1f2d3ad976cc2b8c8f98710c3813ece735656bfb9d5407694214a83955dd25f59

    • C:\Users\Admin\AppData\Roaming\spoolse.exe
      MD5

      421422ea74c1f97efd4c202ab402210d

      SHA1

      674045a74cd3c1d54b494e3638ead5bb9d4e421e

      SHA256

      68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

      SHA512

      b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

    • C:\Users\Admin\AppData\Roaming\spoolse.exe
      MD5

      421422ea74c1f97efd4c202ab402210d

      SHA1

      674045a74cd3c1d54b494e3638ead5bb9d4e421e

      SHA256

      68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

      SHA512

      b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

    • memory/1968-132-0x00000000058E1000-0x00000000058E2000-memory.dmp
      Filesize

      4KB

    • memory/1968-133-0x0000000000D00000-0x0000000000D1A000-memory.dmp
      Filesize

      104KB

    • memory/1968-134-0x0000000010730000-0x0000000010736000-memory.dmp
      Filesize

      24KB

    • memory/1968-135-0x0000000007E20000-0x0000000007E42000-memory.dmp
      Filesize

      136KB

    • memory/1968-131-0x00000000058E0000-0x00000000058E1000-memory.dmp
      Filesize

      4KB

    • memory/1968-130-0x0000000004E50000-0x00000000051A0000-memory.dmp
      Filesize

      3.3MB

    • memory/2000-158-0x0000000000DD0000-0x0000000000DEA000-memory.dmp
      Filesize

      104KB

    • memory/2400-127-0x0000000005891000-0x0000000005892000-memory.dmp
      Filesize

      4KB

    • memory/2400-126-0x000000000B450000-0x000000000B45A000-memory.dmp
      Filesize

      40KB

    • memory/2400-118-0x0000000000410000-0x000000000059C000-memory.dmp
      Filesize

      1.5MB

    • memory/2400-125-0x0000000005200000-0x0000000005216000-memory.dmp
      Filesize

      88KB

    • memory/2400-124-0x0000000005720000-0x0000000005752000-memory.dmp
      Filesize

      200KB

    • memory/2400-123-0x0000000005890000-0x0000000005891000-memory.dmp
      Filesize

      4KB

    • memory/2400-122-0x00000000057C0000-0x000000000585C000-memory.dmp
      Filesize

      624KB

    • memory/2400-121-0x0000000004EA0000-0x00000000051F0000-memory.dmp
      Filesize

      3.3MB

    • memory/2400-120-0x0000000004E00000-0x0000000004E92000-memory.dmp
      Filesize

      584KB

    • memory/2400-119-0x0000000005220000-0x000000000571E000-memory.dmp
      Filesize

      5.0MB

    • memory/2772-144-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/2772-136-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/3608-259-0x0000000000BF0000-0x0000000000C2C000-memory.dmp
      Filesize

      240KB

    • memory/3608-260-0x00000000053B0000-0x00000000053E0000-memory.dmp
      Filesize

      192KB

    • memory/3608-261-0x0000000006070000-0x0000000006088000-memory.dmp
      Filesize

      96KB

    • memory/3608-262-0x0000000006100000-0x0000000006166000-memory.dmp
      Filesize

      408KB

    • memory/3608-266-0x00000000053B0000-0x00000000053E0000-memory.dmp
      Filesize

      192KB

    • memory/4000-253-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/4000-254-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/4000-251-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB