Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-06-2022 23:30

General

  • Target

    c3fe455b6952a4abcda157f240b3b9ee2925ef060b7bc5fe6d214875853867ad.exe

  • Size

    1.8MB

  • MD5

    56d303880d7dd7cc938af1e033c8fa0b

  • SHA1

    55a5a6a829d3ad9799c546f6846150131ef89c1f

  • SHA256

    c3fe455b6952a4abcda157f240b3b9ee2925ef060b7bc5fe6d214875853867ad

  • SHA512

    e98c01d294d113c7dfc079504150e7c0f22b6e6f21cda3186679d24218ad8a8fa6005e59574af45813525ae49ab208c65302585a323488f69ebc04544f5c0a52

Score
10/10

Malware Config

Extracted

Family

remcos

Version

2.5.0 Pro

Botnet

1

C2

193.111.198.220:5861

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Logs

  • keylog_path

    %Temp%

  • mouse_option

    false

  • mutex

    5850Port-UAYNLL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 31 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3fe455b6952a4abcda157f240b3b9ee2925ef060b7bc5fe6d214875853867ad.exe
    "C:\Users\Admin\AppData\Local\Temp\c3fe455b6952a4abcda157f240b3b9ee2925ef060b7bc5fe6d214875853867ad.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mdrs.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\mdrs.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\nslookup.exe
        "C:\Windows\system32\nslookup.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:4868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Blocklisted process makes network request
          • Suspicious use of SetWindowsHookEx
          PID:4536

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\libcrypto-1_1.dll
    Filesize

    4.5MB

    MD5

    d73134c0b780595c6c95f8568c1f81a7

    SHA1

    19bd711b9d66df0353f5d74ae9ef6c30909dba78

    SHA256

    0221fa75ad37f1a90092eb34171740b9f735eda0f50f2f4e7b62fcc9f7a62d70

    SHA512

    e2e6659efdd82ab817c61cfb40669736c2db8c73737de571df7470f5477730e03cb32910e31304fba27dba754de80f7dbe8bdef73a280299b3d9fd307dbea176

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\libcrypto-1_1.dll
    Filesize

    4.5MB

    MD5

    d73134c0b780595c6c95f8568c1f81a7

    SHA1

    19bd711b9d66df0353f5d74ae9ef6c30909dba78

    SHA256

    0221fa75ad37f1a90092eb34171740b9f735eda0f50f2f4e7b62fcc9f7a62d70

    SHA512

    e2e6659efdd82ab817c61cfb40669736c2db8c73737de571df7470f5477730e03cb32910e31304fba27dba754de80f7dbe8bdef73a280299b3d9fd307dbea176

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\libcrypto-1_1.dll
    Filesize

    4.5MB

    MD5

    d73134c0b780595c6c95f8568c1f81a7

    SHA1

    19bd711b9d66df0353f5d74ae9ef6c30909dba78

    SHA256

    0221fa75ad37f1a90092eb34171740b9f735eda0f50f2f4e7b62fcc9f7a62d70

    SHA512

    e2e6659efdd82ab817c61cfb40669736c2db8c73737de571df7470f5477730e03cb32910e31304fba27dba754de80f7dbe8bdef73a280299b3d9fd307dbea176

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mdrs.exe
    Filesize

    630KB

    MD5

    7215c1b9693b1394aaa7c86dcd741ad7

    SHA1

    290dda9a0f85cf5f119cb726e4f5d86696672bbc

    SHA256

    1d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5

    SHA512

    e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mdrs.exe
    Filesize

    630KB

    MD5

    7215c1b9693b1394aaa7c86dcd741ad7

    SHA1

    290dda9a0f85cf5f119cb726e4f5d86696672bbc

    SHA256

    1d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5

    SHA512

    e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945

  • memory/4536-143-0x0000000000000000-mapping.dmp
  • memory/4536-153-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4536-152-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4536-145-0x00000000005F0000-0x00000000005F8000-memory.dmp
    Filesize

    32KB

  • memory/4536-144-0x00007FFD85470000-0x00007FFD85665000-memory.dmp
    Filesize

    2.0MB

  • memory/4868-140-0x00007FFD85470000-0x00007FFD85665000-memory.dmp
    Filesize

    2.0MB

  • memory/4868-142-0x0000000004B17000-0x0000000004B27000-memory.dmp
    Filesize

    64KB

  • memory/4868-141-0x0000000000D80000-0x0000000000D88000-memory.dmp
    Filesize

    32KB

  • memory/4868-139-0x0000000004B10000-0x0000000004B46000-memory.dmp
    Filesize

    216KB

  • memory/4868-150-0x0000000004B17000-0x0000000004B27000-memory.dmp
    Filesize

    64KB

  • memory/4868-136-0x0000000000000000-mapping.dmp
  • memory/4928-130-0x0000000000000000-mapping.dmp
  • memory/4928-138-0x0000000001F70000-0x0000000001F7A000-memory.dmp
    Filesize

    40KB

  • memory/4928-137-0x0000000001F70000-0x0000000001F7A000-memory.dmp
    Filesize

    40KB

  • memory/4928-135-0x0000000001A81000-0x0000000001E56000-memory.dmp
    Filesize

    3.8MB