Analysis

  • max time kernel
    4294218s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    20-03-2022 02:05

General

  • Target

    bbf6829ce1ce8dc4b0d023e92e0766d4f74c129c1cfbcfcfbac0dfa07a5533b7.dll

  • Size

    1.1MB

  • MD5

    c46912b6dedfa5321e367998711599a1

  • SHA1

    629ce7047b6f1e949212d49f962e6d1f95c563f0

  • SHA256

    bbf6829ce1ce8dc4b0d023e92e0766d4f74c129c1cfbcfcfbac0dfa07a5533b7

  • SHA512

    89aeb5e6ec79e04b55cb0b7a8983ad4569e5cfbe741c6570deec78faeccadefd43f925b3d937a5d455971bc9634156878c87f002f810dd6d0ea922e1655335e6

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.6.0 Pro

Botnet

BTC

C2

94.242.206.175:5886

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    MSI

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    MSI-PBVFMV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bbf6829ce1ce8dc4b0d023e92e0766d4f74c129c1cfbcfcfbac0dfa07a5533b7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bbf6829ce1ce8dc4b0d023e92e0766d4f74c129c1cfbcfcfbac0dfa07a5533b7.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\SysWOW64\extrac32.exe
        "C:\Windows\system32\extrac32.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:1200
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
              PID:1676
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe"
              4⤵
                PID:1172
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe"
                4⤵
                  PID:372
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe"
                  4⤵
                    PID:1548
                  • C:\Windows\SysWOW64\notepad.exe
                    "C:\Windows\system32\notepad.exe"
                    4⤵
                      PID:932
                    • C:\Windows\SysWOW64\notepad.exe
                      "C:\Windows\system32\notepad.exe"
                      4⤵
                        PID:704
                      • C:\Windows\SysWOW64\notepad.exe
                        "C:\Windows\system32\notepad.exe"
                        4⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1952

                Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/848-57-0x00000000000D0000-0x00000000000D2000-memory.dmp
                  Filesize

                  8KB

                • memory/848-59-0x0000000000190000-0x0000000000198000-memory.dmp
                  Filesize

                  32KB

                • memory/848-60-0x0000000077A80000-0x0000000077C29000-memory.dmp
                  Filesize

                  1.7MB

                • memory/848-62-0x0000000016707000-0x0000000016717000-memory.dmp
                  Filesize

                  64KB

                • memory/972-54-0x0000000075B01000-0x0000000075B03000-memory.dmp
                  Filesize

                  8KB

                • memory/972-55-0x00000000007A0000-0x00000000008C4000-memory.dmp
                  Filesize

                  1.1MB

                • memory/972-56-0x00000000001A0000-0x00000000001AA000-memory.dmp
                  Filesize

                  40KB

                • memory/1952-70-0x0000000000080000-0x0000000000088000-memory.dmp
                  Filesize

                  32KB

                • memory/1952-71-0x0000000077A80000-0x0000000077C29000-memory.dmp
                  Filesize

                  1.7MB

                • memory/1952-76-0x0000000000400000-0x0000000000421000-memory.dmp
                  Filesize

                  132KB