Analysis

  • max time kernel
    151s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 18:52

General

  • Target

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe

  • Size

    346KB

  • MD5

    2b68d09ec642b7596da0f63eff388561

  • SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

  • SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

  • SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

Malware Config

Extracted

Family

remcos

Version

2.4.5 Pro

Botnet

2400

C2

fouskal.theworkpc.com:2400

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    3

  • copy_file

    Defender-anti.exe

  • copy_folder

    Microsoft-System

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %ProgramFiles%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-X75C7H

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    sips3

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    defender-system

  • take_screenshot_option

    true

  • take_screenshot_time

    1

  • take_screenshot_title

    amazon;secure;checkout;payment;rakuten;order;sncf;secure2;pay;hipay;bricoprive;webpayment;payline;Alipay;hsbc;3d;secur5e;authentification;paybox;récapitilatif;systempay;worldpay;secure1;cic;sips;3dsecure;sogenactif;paiement;paypal;paylib;webpayment

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2000
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
      "C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe"
      2⤵
      • Executes dropped EXE
      PID:1988
    • C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
      "C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Microsoft-System\Defender-anti.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Program Files (x86)\Microsoft-System\Defender-anti.exe
            "C:\Program Files (x86)\Microsoft-System\Defender-anti.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:564
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Program Files (x86)\Microsoft-System\Defender-anti.exe:Zone.Identifier"
              6⤵
              • Drops file in Program Files directory
              • NTFS ADS
              PID:1984
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Program Files (x86)\Microsoft-System\Defender-anti.exe:Zone.Identifier"
              6⤵
              • Drops file in Program Files directory
              • NTFS ADS
              PID:984
            • C:\Program Files (x86)\Microsoft-System\Defender-anti.exe
              "C:\Program Files (x86)\Microsoft-System\Defender-anti.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:1100
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1416
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 1432
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:1348

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • C:\Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • C:\Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • C:\Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • C:\Users\Admin\AppData\Local\Temp\install.vbs
    Filesize

    436B

    MD5

    722a09a85da1d662aa1a144a1c4152d5

    SHA1

    d4dfc22c306fa93ed7d1442f0f1ac735a4052900

    SHA256

    e6da0b0d8527a52e2e3bb7af630ac1ecd56ad753c4e5d6b6bd0067510ac09f88

    SHA512

    c308eb8813e3d6eeded8042a07e104e8c53c4a56b65fcc1ff179be505a84b5a556897a5ac8e9466a9596ebab175a2be445dcc3a9d076a774f73e9e221ed520ac

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Program Files (x86)\Microsoft-System\Defender-anti.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • \Users\Admin\AppData\Local\Temp\b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8.exe
    Filesize

    346KB

    MD5

    2b68d09ec642b7596da0f63eff388561

    SHA1

    1244d336e4ed400ff79e76db03aa51a0718b152a

    SHA256

    b2d24cd226df824d386dd211ef30ae24e31cfc8a07db142b9e0e2500729d89a8

    SHA512

    7b31908eb6aed40b0c57536678523fc7447df22cc08b77548d79a2e326bdc421096085b627427956edff0f960e3886e6efff43ad10f81dd955a73e22f1bd439b

  • memory/564-96-0x0000000000CD0000-0x0000000000D2C000-memory.dmp
    Filesize

    368KB

  • memory/564-94-0x0000000000000000-mapping.dmp
  • memory/596-71-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-80-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-69-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-73-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-76-0x00000000004139A4-mapping.dmp
  • memory/596-66-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-87-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-67-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-75-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/596-72-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/868-91-0x0000000000000000-mapping.dmp
  • memory/984-99-0x0000000000000000-mapping.dmp
  • memory/1100-122-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1100-120-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1100-111-0x00000000004139A4-mapping.dmp
  • memory/1348-81-0x0000000000000000-mapping.dmp
  • memory/1768-60-0x0000000000000000-mapping.dmp
  • memory/1920-62-0x0000000000A70000-0x0000000000A7C000-memory.dmp
    Filesize

    48KB

  • memory/1920-61-0x0000000000A30000-0x0000000000A3C000-memory.dmp
    Filesize

    48KB

  • memory/1920-59-0x0000000000840000-0x0000000000848000-memory.dmp
    Filesize

    32KB

  • memory/1920-54-0x0000000000110000-0x000000000016C000-memory.dmp
    Filesize

    368KB

  • memory/1920-57-0x0000000075F61000-0x0000000075F63000-memory.dmp
    Filesize

    8KB

  • memory/1920-56-0x00000000003D0000-0x00000000003F8000-memory.dmp
    Filesize

    160KB

  • memory/1920-55-0x00000000003A0000-0x00000000003CC000-memory.dmp
    Filesize

    176KB

  • memory/1936-114-0x0000000000000000-mapping.dmp
  • memory/1984-98-0x0000000000000000-mapping.dmp
  • memory/2000-58-0x0000000000000000-mapping.dmp
  • memory/2028-86-0x0000000000000000-mapping.dmp