Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:14

General

  • Target

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe

  • Size

    119KB

  • MD5

    a257f126fda7ec1745bbbdb0ecb97dce

  • SHA1

    354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e

  • SHA256

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d

  • SHA512

    36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Lockdown Open

C2

ascoitaliasa.duckdns.org:4046

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Windows logoff sound.exe

  • copy_folder

    Microsoft Media

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Windows Audio

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Window Audio

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    Window sound

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    Password;Username;proformer;invoice;notepad

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe
    "C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d.exe
      "{path}"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Modifies registry key
          PID:1152
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\SysWOW64\PING.EXE
          PING 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:1896
        • C:\Windows\Microsoft Media\Windows logoff sound.exe
          "C:\Windows\Microsoft Media\Windows logoff sound.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\Microsoft Media\Windows logoff sound.exe
            "{path}"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:616
            • C:\Windows\SysWOW64\cmd.exe
              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1752
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                7⤵
                • Modifies registry key
                PID:1532
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1720
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:432
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1584

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

4
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.dat
    Filesize

    21KB

    MD5

    4ca02529103eb488098394aa260ae82a

    SHA1

    6c0132734397e534aa7487e4d370762b38cd8942

    SHA256

    ec9edc65f2e37204400cf90c4739f9b938fff7e461e9b2222063350b2d576ec1

    SHA512

    20958c2e37f4f9385fbe36ffeb8c97dd4857d6f839620bf34de061b8c6d8cd0e60993ffd5a0a6dc71bb66917003b65c27c277efe4f57dee17ed7150fd02f200e

  • C:\Users\Admin\AppData\Local\Temp\install.bat
    Filesize

    102B

    MD5

    d65c998bd7769229c5cd6c8a1ae4b639

    SHA1

    59afa2c156d6d670d8e87d61756b814d3bc19bb3

    SHA256

    bac6c33f44976bb615821bb75ab53cbb8c34d53a00246f68f62b255ef0ba1d7f

    SHA512

    a56827185f39b896555ddd52391235b9a93e79c269674bf1db729abe728e452ecee1a42749352e12c7261eb114bb66add062cb41f367d5e971ea406bfc831895

  • C:\Windows\Microsoft Media\Windows logoff sound.exe
    Filesize

    119KB

    MD5

    a257f126fda7ec1745bbbdb0ecb97dce

    SHA1

    354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e

    SHA256

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d

    SHA512

    36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2

  • C:\Windows\Microsoft Media\Windows logoff sound.exe
    Filesize

    119KB

    MD5

    a257f126fda7ec1745bbbdb0ecb97dce

    SHA1

    354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e

    SHA256

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d

    SHA512

    36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2

  • C:\Windows\Microsoft Media\Windows logoff sound.exe
    Filesize

    119KB

    MD5

    a257f126fda7ec1745bbbdb0ecb97dce

    SHA1

    354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e

    SHA256

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d

    SHA512

    36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2

  • \Windows\Microsoft Media\Windows logoff sound.exe
    Filesize

    119KB

    MD5

    a257f126fda7ec1745bbbdb0ecb97dce

    SHA1

    354cda5f58ff5828c9ce38b95f3c6d4aa6f59f6e

    SHA256

    77ac51b18cd4a709780da4ca82a3f3a82d18600b9cbb9933f0dcf8dbe117872d

    SHA512

    36ed37c96165672c49aa1b5d83988eda5063372bbbb1bf6f4c21868b80cd062895c94e9653ca2de30bbd2c55696ca12bfa744f1aacd500bdc9665c1d7827c5f2

  • memory/560-71-0x0000000000000000-mapping.dmp
  • memory/616-88-0x000000000040FD88-mapping.dmp
  • memory/616-95-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/616-92-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1152-70-0x0000000000000000-mapping.dmp
  • memory/1516-63-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-56-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-64-0x000000000040FD88-mapping.dmp
  • memory/1516-62-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-67-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-61-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-59-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-57-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1516-69-0x0000000000400000-0x0000000000417000-memory.dmp
    Filesize

    92KB

  • memory/1532-94-0x0000000000000000-mapping.dmp
  • memory/1716-79-0x00000000747B0000-0x0000000074D5B000-memory.dmp
    Filesize

    5.7MB

  • memory/1716-76-0x0000000000000000-mapping.dmp
  • memory/1752-93-0x0000000000000000-mapping.dmp
  • memory/1768-68-0x0000000000000000-mapping.dmp
  • memory/1896-73-0x0000000000000000-mapping.dmp
  • memory/1972-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
    Filesize

    8KB

  • memory/1972-55-0x0000000074D60000-0x000000007530B000-memory.dmp
    Filesize

    5.7MB