Analysis

  • max time kernel
    168s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    25-03-2022 13:44

General

  • Target

    WAYBILL.exe

  • Size

    1.0MB

  • MD5

    a7c29d968ed68f24747b39f1bcec2705

  • SHA1

    0a30a96b8a155f03516812df1e4bffebeadca698

  • SHA256

    db5a12184d9b6acdf484a88b3e65aa9435f8a9d7eda48418aef2d028b98913d4

  • SHA512

    9b6a70d28e4ab26e7b0c4ae79b4a1211da45af13aaf5eb27d0eb6080f520e47dea134a2d45f6ab3caef4e04c363e4bafbc9589404a146e478c9e68b4d36d6729

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

flexyval01.hopto.org:2404

flexyval02.hopto.org:2404

flexyval03.hopto.org:2404

flexyval04.hopto.org:2404

flexyval06.hopto.org:2404

flexyval05.hopto.org:2404

flexyval07.hopto.org:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Gallery-STMAJU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WAYBILL.exe
    "C:\Users\Admin\AppData\Local\Temp\WAYBILL.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\DpiScaling.exe
      C:\Windows\System32\DpiScaling.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\obnllts"
        3⤵
          PID:768
        • C:\Windows\SysWOW64\DpiScaling.exe
          C:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\zvaeemddfmt"
          3⤵
            PID:2140
          • C:\Windows\SysWOW64\DpiScaling.exe
            C:\Windows\SysWOW64\DpiScaling.exe /stext "C:\Users\Admin\AppData\Local\Temp\jpgofwnftulaan"
            3⤵
              PID:1204

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2784-136-0x0000000010590000-0x000000001060D000-memory.dmp

          Filesize

          500KB

        • memory/2784-137-0x0000000002E10000-0x0000000002E8A000-memory.dmp

          Filesize

          488KB