Analysis

  • max time kernel
    150s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 01:18

General

  • Target

    Quotation Sheet and PO-including FOB, MOQ.exe

  • Size

    240KB

  • MD5

    575d7ca2e5fc3ff6e2d568ab8c67c5d8

  • SHA1

    9c399b34f7391602b3b70cb7b4b60a1af8d0b65e

  • SHA256

    fd4d0c198aa010dee3d726fe7d7a526725b51404c1684b7df9d520455e5d16ec

  • SHA512

    deaeb797c0667351290b5d84716dee1faeead5228c440b270b1fd18bc805b07e0292206d386807d88337ae388b209d83addf8b3d21542b5ae7c1341233881a92

Malware Config

Extracted

Family

remcos

Version

2.5.0 Pro

Botnet

MARSHAL HOST

C2

194.5.99.143:6666

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-NTSQI6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation Sheet and PO-including FOB, MOQ.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation Sheet and PO-including FOB, MOQ.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UOTSTlVU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp17D5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:880
    • C:\Users\Admin\AppData\Local\Temp\Quotation Sheet and PO-including FOB, MOQ.exe
      "{path}"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp17D5.tmp
    Filesize

    1KB

    MD5

    933768f9a2536f48bf18c7cb82173cd6

    SHA1

    2b82e41ea1b318ba96a7a1cea9ad336d448b490b

    SHA256

    77b46cc404f6b1df3d54702a68a369b271c95651eb91f930b5ebcad8fbb4cbdf

    SHA512

    91e1cc8d9ab943e16237ebadbb96a77534e1bba67b34ab24e0e339cc6001a699e2ee44851dafd0c6549d91adf22b329c2fb8b12cb4a6210ee6ae1b5063090a01

  • memory/880-58-0x0000000000000000-mapping.dmp
  • memory/1312-63-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-65-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-74-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-73-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-60-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-61-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-70-0x0000000000413A84-mapping.dmp
  • memory/1312-69-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-66-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1312-67-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1364-57-0x0000000000A80000-0x0000000000AAC000-memory.dmp
    Filesize

    176KB

  • memory/1364-54-0x0000000000AB0000-0x0000000000AF2000-memory.dmp
    Filesize

    264KB

  • memory/1364-55-0x0000000075501000-0x0000000075503000-memory.dmp
    Filesize

    8KB

  • memory/1364-56-0x00000000007F0000-0x00000000007F8000-memory.dmp
    Filesize

    32KB