Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2022 14:33

General

  • Target

    QUOTE # EM067022.exe

  • Size

    6KB

  • MD5

    588dc78669c70ad45eefa0f2f7497815

  • SHA1

    b90622241361b61445565eb15404dfbfa53561e4

  • SHA256

    85d306912be80587264953469ca21f62da4c6b7cd1913b794787a563f90ef48c

  • SHA512

    c57ad96fd559abebef976f41a30bb1cca86f3dc725765100bd6d7ba26bd673838d88df8ed9b748534a2d9ba681e4fe27c8fd291772c736141017c5ebf07f0ab3

  • SSDEEP

    96:P/0MlfkKuMroRDQU2BwI47oxCXkMa/kjEthqFnU:3RZnctQUbIYXrasQrf

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

172.111.234.110:5888

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ULBEJI

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
    • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
      "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
        "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe" /stext "C:\Users\Admin\AppData\Local\Temp\daey"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5072
      • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
        "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nujrvfs"
        3⤵
          PID:3096
        • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
          "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe" /stext "C:\Users\Admin\AppData\Local\Temp\yxwbwydxjqh"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4532
        • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
          "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe" /stext "C:\Users\Admin\AppData\Local\Temp\yxwbwydxjqh"
          3⤵
            PID:3596
          • C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe
            "C:\Users\Admin\AppData\Local\Temp\QUOTE # EM067022.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nujrvfs"
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:4236

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\daey

        Filesize

        4KB

        MD5

        30177e1276595fd69ea96b692f49d776

        SHA1

        75769c29031ca1ad8e175dd700c74b5e35c5b0c7

        SHA256

        76d4066990e2ee2776f733a25ce23e9af545fd6f1a3b5760d603bdc05d9402d5

        SHA512

        ccdf20174d299de8ec21445faaf4ebe95c04bd7634c9fe138ba54262b754620c2dfd53a5c94b7d53518181d2eab7b5c97d7933d3a66d05220b06aee120893d4b

      • memory/3096-149-0x0000000000000000-mapping.dmp

      • memory/3596-151-0x0000000000000000-mapping.dmp

      • memory/4236-153-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/4236-150-0x0000000000000000-mapping.dmp

      • memory/4236-156-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/4320-139-0x0000000006320000-0x000000000633E000-memory.dmp

        Filesize

        120KB

      • memory/4320-135-0x0000000004D60000-0x0000000004D96000-memory.dmp

        Filesize

        216KB

      • memory/4320-140-0x0000000007B90000-0x000000000820A000-memory.dmp

        Filesize

        6.5MB

      • memory/4320-141-0x0000000006840000-0x000000000685A000-memory.dmp

        Filesize

        104KB

      • memory/4320-134-0x0000000000000000-mapping.dmp

      • memory/4320-136-0x00000000053E0000-0x0000000005A08000-memory.dmp

        Filesize

        6.2MB

      • memory/4320-137-0x0000000005C40000-0x0000000005CA6000-memory.dmp

        Filesize

        408KB

      • memory/4320-138-0x0000000005CB0000-0x0000000005D16000-memory.dmp

        Filesize

        408KB

      • memory/4532-155-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/4532-159-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/4532-152-0x0000000000000000-mapping.dmp

      • memory/4724-142-0x0000000000000000-mapping.dmp

      • memory/4724-145-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/4724-144-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/4724-143-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/4724-146-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/4724-147-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/4760-132-0x0000000000270000-0x0000000000278000-memory.dmp

        Filesize

        32KB

      • memory/4760-133-0x0000000008E90000-0x0000000008EB2000-memory.dmp

        Filesize

        136KB

      • memory/5072-154-0x0000000000400000-0x0000000000478000-memory.dmp

        Filesize

        480KB

      • memory/5072-148-0x0000000000000000-mapping.dmp

      • memory/5072-157-0x0000000000400000-0x0000000000478000-memory.dmp

        Filesize

        480KB