Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2022 10:03

General

  • Target

    MAEB-157-88949280.docx

  • Size

    10KB

  • MD5

    49f5dca0159055482bcb7440bcda8fcb

  • SHA1

    ca87c82b8713faa52017f375a9f9a63d9c13fb2f

  • SHA256

    204327a339923b46b1fece95a1d1b6d0b2e2b5917ad10e65b27fefa6d717ea33

  • SHA512

    cffc825895d7cd0c02dccd5585e5bb4cad386fda0361259d0d562d6fa8148e62bd46cf714172459cb1ddb887d1020491786bbf7f034e0f9189ae29e04978418c

  • SSDEEP

    192:ScIMmtPYqPC7UpG/bkpbJNOfrdlJFtGxV3Orl:SPXgqPCfIJNOfjJFtGxxOR

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.populargroup.pk
  • Port:
    587
  • Username:
    stores.pfi3@populargroup.pk
  • Password:
    Shahid0786pfi3

Extracted

Family

remcos

Botnet

RemoteHost

C2

mam.mastercoa.co:37824

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3FCFQU

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\MAEB-157-88949280.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1628
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:476
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          3⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1820
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\hdluizowdc"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1140
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\sxqfjszyzkkfh"
            4⤵
            • Accesses Microsoft Outlook accounts
            PID:832
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\uzwxckkrnsckkmwx"
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
          • C:\Users\Admin\AppData\Local\Temp\dwn.exe
            "C:\Users\Admin\AppData\Local\Temp\dwn.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:864
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAwAA==
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1568
            • C:\Users\Admin\AppData\Local\Temp\dwn.exe
              C:\Users\Admin\AppData\Local\Temp\dwn.exe
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:1140

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    2
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dwn.exe
      Filesize

      1.5MB

      MD5

      b436cdce4d9ebc9ff92b5d859a12ee76

      SHA1

      4896596ebd58760aefaf5d6369cc7c61c6427af4

      SHA256

      099d61bd75a11b7d560c14b8754405ef2707a4b1db5d7c2827a3226aff07511b

      SHA512

      7336cc3c3946250733e8f745583a316caf1a57a41e1cd0f7ae17bf3e2846195a4566993ff27c09091b30a63da5edbcb70ccd45169dec6b7aa0692725f571aec1

    • C:\Users\Admin\AppData\Local\Temp\dwn.exe
      Filesize

      1.5MB

      MD5

      b436cdce4d9ebc9ff92b5d859a12ee76

      SHA1

      4896596ebd58760aefaf5d6369cc7c61c6427af4

      SHA256

      099d61bd75a11b7d560c14b8754405ef2707a4b1db5d7c2827a3226aff07511b

      SHA512

      7336cc3c3946250733e8f745583a316caf1a57a41e1cd0f7ae17bf3e2846195a4566993ff27c09091b30a63da5edbcb70ccd45169dec6b7aa0692725f571aec1

    • C:\Users\Admin\AppData\Local\Temp\dwn.exe
      Filesize

      1.5MB

      MD5

      b436cdce4d9ebc9ff92b5d859a12ee76

      SHA1

      4896596ebd58760aefaf5d6369cc7c61c6427af4

      SHA256

      099d61bd75a11b7d560c14b8754405ef2707a4b1db5d7c2827a3226aff07511b

      SHA512

      7336cc3c3946250733e8f745583a316caf1a57a41e1cd0f7ae17bf3e2846195a4566993ff27c09091b30a63da5edbcb70ccd45169dec6b7aa0692725f571aec1

    • C:\Users\Admin\AppData\Local\Temp\hdluizowdc
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      7cb2b0a742e990c3539827b3b7001c8a

      SHA1

      886926962a5a0c114a0714b8b7f9b4ca6fae8923

      SHA256

      804112bf2ffa7356e1908efd260a2a24365a7596a5f5233551f86cb80e903742

      SHA512

      b6891b16b4f03e1a654e3cb2c836f999a95e52032a29d5d4973cccddd61299f56c4e3046bdb87c9312c07a011e161fcd1a7c919226e70d181ff8c7d97e7fdf66

    • C:\Users\Public\vbc.exe
      Filesize

      1.8MB

      MD5

      ed7fa6ec8aa0602b18ac40bf6abff7e6

      SHA1

      21f14e8533a1143001c0bc1a842cb4f9f4c69a8a

      SHA256

      341e2d5159578433b9509ab15c1b2acd52162a51531d8c94689286a91eebcdc4

      SHA512

      3388db86341f13ed30d40942df6b1844c6ebdbe7a360749edec9b23b87ca106ae90082c08648308fc9a9f78a4ffdd0c92855b090aeca52ddc00a903834d856e7

    • C:\Users\Public\vbc.exe
      Filesize

      1.8MB

      MD5

      ed7fa6ec8aa0602b18ac40bf6abff7e6

      SHA1

      21f14e8533a1143001c0bc1a842cb4f9f4c69a8a

      SHA256

      341e2d5159578433b9509ab15c1b2acd52162a51531d8c94689286a91eebcdc4

      SHA512

      3388db86341f13ed30d40942df6b1844c6ebdbe7a360749edec9b23b87ca106ae90082c08648308fc9a9f78a4ffdd0c92855b090aeca52ddc00a903834d856e7

    • \??\PIPE\srvsvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Local\Temp\dwn.exe
      Filesize

      1.5MB

      MD5

      b436cdce4d9ebc9ff92b5d859a12ee76

      SHA1

      4896596ebd58760aefaf5d6369cc7c61c6427af4

      SHA256

      099d61bd75a11b7d560c14b8754405ef2707a4b1db5d7c2827a3226aff07511b

      SHA512

      7336cc3c3946250733e8f745583a316caf1a57a41e1cd0f7ae17bf3e2846195a4566993ff27c09091b30a63da5edbcb70ccd45169dec6b7aa0692725f571aec1

    • \Users\Admin\AppData\Local\Temp\dwn.exe
      Filesize

      1.5MB

      MD5

      b436cdce4d9ebc9ff92b5d859a12ee76

      SHA1

      4896596ebd58760aefaf5d6369cc7c61c6427af4

      SHA256

      099d61bd75a11b7d560c14b8754405ef2707a4b1db5d7c2827a3226aff07511b

      SHA512

      7336cc3c3946250733e8f745583a316caf1a57a41e1cd0f7ae17bf3e2846195a4566993ff27c09091b30a63da5edbcb70ccd45169dec6b7aa0692725f571aec1

    • \Users\Public\vbc.exe
      Filesize

      1.8MB

      MD5

      ed7fa6ec8aa0602b18ac40bf6abff7e6

      SHA1

      21f14e8533a1143001c0bc1a842cb4f9f4c69a8a

      SHA256

      341e2d5159578433b9509ab15c1b2acd52162a51531d8c94689286a91eebcdc4

      SHA512

      3388db86341f13ed30d40942df6b1844c6ebdbe7a360749edec9b23b87ca106ae90082c08648308fc9a9f78a4ffdd0c92855b090aeca52ddc00a903834d856e7

    • memory/476-67-0x0000000000000000-mapping.dmp
    • memory/476-73-0x0000000065E50000-0x00000000663FB000-memory.dmp
      Filesize

      5.7MB

    • memory/476-69-0x0000000004C70000-0x0000000004F42000-memory.dmp
      Filesize

      2.8MB

    • memory/476-70-0x0000000065E50000-0x00000000663FB000-memory.dmp
      Filesize

      5.7MB

    • memory/552-65-0x0000000000E10000-0x0000000000EF2000-memory.dmp
      Filesize

      904KB

    • memory/552-61-0x0000000000000000-mapping.dmp
    • memory/552-64-0x0000000000EF0000-0x00000000010B6000-memory.dmp
      Filesize

      1.8MB

    • memory/552-66-0x00000000048B0000-0x0000000004942000-memory.dmp
      Filesize

      584KB

    • memory/832-115-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/832-93-0x0000000000455238-mapping.dmp
    • memory/832-99-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/864-105-0x0000000000C50000-0x0000000000DCC000-memory.dmp
      Filesize

      1.5MB

    • memory/864-106-0x0000000004330000-0x00000000043EC000-memory.dmp
      Filesize

      752KB

    • memory/864-102-0x0000000000000000-mapping.dmp
    • memory/1060-134-0x0000000070F3D000-0x0000000070F48000-memory.dmp
      Filesize

      44KB

    • memory/1060-57-0x0000000074DC1000-0x0000000074DC3000-memory.dmp
      Filesize

      8KB

    • memory/1060-58-0x0000000070F3D000-0x0000000070F48000-memory.dmp
      Filesize

      44KB

    • memory/1060-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1060-55-0x000000006FF51000-0x000000006FF53000-memory.dmp
      Filesize

      8KB

    • memory/1060-133-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1060-54-0x00000000724D1000-0x00000000724D4000-memory.dmp
      Filesize

      12KB

    • memory/1140-126-0x00000000004359DE-mapping.dmp
    • memory/1140-107-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1140-92-0x0000000000476274-mapping.dmp
    • memory/1140-100-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1140-129-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-120-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-121-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-123-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-125-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-124-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1140-131-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1568-108-0x0000000000000000-mapping.dmp
    • memory/1568-117-0x0000000065A80000-0x000000006602B000-memory.dmp
      Filesize

      5.7MB

    • memory/1568-118-0x0000000065A80000-0x000000006602B000-memory.dmp
      Filesize

      5.7MB

    • memory/1568-112-0x0000000065A80000-0x000000006602B000-memory.dmp
      Filesize

      5.7MB

    • memory/1568-113-0x0000000004DF0000-0x00000000050C2000-memory.dmp
      Filesize

      2.8MB

    • memory/1628-71-0x0000000000000000-mapping.dmp
    • memory/1628-72-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp
      Filesize

      8KB

    • memory/1820-81-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-82-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-91-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-90-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-87-0x00000000004327A4-mapping.dmp
    • memory/1820-86-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-116-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-74-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-84-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-79-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-80-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-77-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1820-75-0x0000000000400000-0x000000000047F000-memory.dmp
      Filesize

      508KB

    • memory/1924-98-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1924-94-0x0000000000422206-mapping.dmp