Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    28-07-2022 14:19

General

  • Target

    335b1296fa572b01158f7e8ef89c7064.exe

  • Size

    479KB

  • MD5

    335b1296fa572b01158f7e8ef89c7064

  • SHA1

    4d41f80a6f2082acee991b6fdd830a3ae770ee6f

  • SHA256

    4f660ee7d657778dc8c78514b1fa51f42decdfc61e1d609e6a7286ba2c20c70a

  • SHA512

    a56e720d4ebcd2eab1949a796e6d46a355b6e507cda04f94d118543c95291b13802e24b118f7fe8dff26bc300fb5f7546ee73f9b7f1996453375b585a07b823e

Malware Config

Extracted

Family

remcos

Botnet

windows

C2

newstub01.duckdns.org:1888

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    systemdll.exe

  • copy_folder

    system

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    system

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    mutex-LK2O9P

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    windows

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\335b1296fa572b01158f7e8ef89c7064.exe
    "C:\Users\Admin\AppData\Local\Temp\335b1296fa572b01158f7e8ef89c7064.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\MgQfxx.exe
      C:\Users\Admin\AppData\Local\Temp\MgQfxx.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\29fd4ec4.bat" "
        3⤵
          PID:1648
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\system\systemdll.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Users\Admin\AppData\Roaming\system\systemdll.exe
            C:\Users\Admin\AppData\Roaming\system\systemdll.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetWindowsHookEx
            PID:1836

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\29fd4ec4.bat
      Filesize

      187B

      MD5

      953637dc25f091f981ee5bd3eb4dfcc6

      SHA1

      311308cf2397f4af8b68145b820a4148c7c2f20c

      SHA256

      6c4c876872dd0e9e8c9af39e688765e62642c28938a5042c59a554432285aacc

      SHA512

      d12a6436e64ac9b853f504badd18537bb7abd9ffc12bd05ad1e3eb69c145a690bd95d08cacbd8f3035145098072b97930bdc14d5a48610449c09497450460a41

    • C:\Users\Admin\AppData\Local\Temp\MgQfxx.exe
      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\MgQfxx.exe
      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • C:\Users\Admin\AppData\Local\Temp\install.vbs
      Filesize

      424B

      MD5

      d4b1736d1323baf583b4a714186af443

      SHA1

      99d475eaeddeeae86429aa63741032c22569e9e4

      SHA256

      e52e19416bf776679ddcc928e9859b69c9313234ab6ed82bfa2af33b90150b4d

      SHA512

      2377b5ad6f006ba516faafe3239bd4617b8c571b87e5b24a7e6b675af7e8d3c4dcaffa4acb6b74c1d637a2352ad87b86b733b4ced689798d73817ce67d22c0b3

    • C:\Users\Admin\AppData\Roaming\system\systemdll.exe
      Filesize

      479KB

      MD5

      335b1296fa572b01158f7e8ef89c7064

      SHA1

      4d41f80a6f2082acee991b6fdd830a3ae770ee6f

      SHA256

      4f660ee7d657778dc8c78514b1fa51f42decdfc61e1d609e6a7286ba2c20c70a

      SHA512

      a56e720d4ebcd2eab1949a796e6d46a355b6e507cda04f94d118543c95291b13802e24b118f7fe8dff26bc300fb5f7546ee73f9b7f1996453375b585a07b823e

    • C:\Users\Admin\AppData\Roaming\system\systemdll.exe
      Filesize

      479KB

      MD5

      335b1296fa572b01158f7e8ef89c7064

      SHA1

      4d41f80a6f2082acee991b6fdd830a3ae770ee6f

      SHA256

      4f660ee7d657778dc8c78514b1fa51f42decdfc61e1d609e6a7286ba2c20c70a

      SHA512

      a56e720d4ebcd2eab1949a796e6d46a355b6e507cda04f94d118543c95291b13802e24b118f7fe8dff26bc300fb5f7546ee73f9b7f1996453375b585a07b823e

    • \Users\Admin\AppData\Local\Temp\MgQfxx.exe
      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Local\Temp\MgQfxx.exe
      Filesize

      15KB

      MD5

      56b2c3810dba2e939a8bb9fa36d3cf96

      SHA1

      99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

      SHA256

      4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

      SHA512

      27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

    • \Users\Admin\AppData\Roaming\system\systemdll.exe
      Filesize

      479KB

      MD5

      335b1296fa572b01158f7e8ef89c7064

      SHA1

      4d41f80a6f2082acee991b6fdd830a3ae770ee6f

      SHA256

      4f660ee7d657778dc8c78514b1fa51f42decdfc61e1d609e6a7286ba2c20c70a

      SHA512

      a56e720d4ebcd2eab1949a796e6d46a355b6e507cda04f94d118543c95291b13802e24b118f7fe8dff26bc300fb5f7546ee73f9b7f1996453375b585a07b823e

    • \Users\Admin\AppData\Roaming\system\systemdll.exe
      Filesize

      479KB

      MD5

      335b1296fa572b01158f7e8ef89c7064

      SHA1

      4d41f80a6f2082acee991b6fdd830a3ae770ee6f

      SHA256

      4f660ee7d657778dc8c78514b1fa51f42decdfc61e1d609e6a7286ba2c20c70a

      SHA512

      a56e720d4ebcd2eab1949a796e6d46a355b6e507cda04f94d118543c95291b13802e24b118f7fe8dff26bc300fb5f7546ee73f9b7f1996453375b585a07b823e

    • memory/268-72-0x0000000000160000-0x00000000001DF000-memory.dmp
      Filesize

      508KB

    • memory/268-66-0x0000000000000000-mapping.dmp
    • memory/1168-61-0x0000000000000000-mapping.dmp
    • memory/1208-62-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1208-54-0x00000000758D1000-0x00000000758D3000-memory.dmp
      Filesize

      8KB

    • memory/1648-76-0x0000000000000000-mapping.dmp
    • memory/1836-70-0x0000000000000000-mapping.dmp
    • memory/1836-74-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1836-75-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/2020-65-0x0000000000E70000-0x0000000000E79000-memory.dmp
      Filesize

      36KB

    • memory/2020-77-0x0000000000E70000-0x0000000000E79000-memory.dmp
      Filesize

      36KB

    • memory/2020-57-0x0000000000000000-mapping.dmp