Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 12:31

General

  • Target

    e891b42605aed838a3c8e5be6e5bf491.com.exe

  • Size

    1.3MB

  • MD5

    2385e8dfbfb88478214c112b5752da42

  • SHA1

    bcfd36722ac110657b8629359d0a85d91dfc4158

  • SHA256

    5323dc8bea28e435e02e60851888f0bec221a2e89128443f985a3adc1ff12353

  • SHA512

    63bb666ff1bb875ed0988fc15963d8ee72b8dd41feb6726d526af0b6cb8bfe89a5cf1a1a20e997dc4e0d05718e9c756e843a2f2bfd78642fa59173e25bf4a007

  • SSDEEP

    24576:0AOcZ2i7SEOWDLUpG8hCyJV0TB4PQdTr+Mo5pemHI0YuyqC8guTl:iiH8hCoit4Cxo5EmHWqC8n

Malware Config

Extracted

Family

remcos

Botnet

EXPLORER WDs

C2

198.23.207.34:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-563ZPZ

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    PingPongWD

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

vjw0rm

C2

http://129.204.138.203:7974

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 1 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e891b42605aed838a3c8e5be6e5bf491.com.exe
    "C:\Users\Admin\AppData\Local\Temp\e891b42605aed838a3c8e5be6e5bf491.com.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\temp\10_68\Dropperremvom.exe
      "C:\Users\Admin\AppData\Local\temp\10_68\Dropperremvom.exe" ... that Dmitri Smirnov (pictured) composed the Triple Concerto No.
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe
        "C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe" 0
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1016
        • C:\Windows\SysWOW64\cmd.exe
          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • UAC bypass
            • Modifies registry key
            PID:1260
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rfil.js" 0
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:784
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\10_68\dwganrrebc.vbe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe
        "C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe" oshcddl.okk
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe"
          4⤵
            PID:956
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe"
            4⤵
              PID:672
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe"
              4⤵
                PID:1576
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe"
                4⤵
                  PID:1172
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\SysWOW64\mshta.exe"
                  4⤵
                    PID:780
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe"
                    4⤵
                      PID:1564
                    • C:\Windows\SysWOW64\mshta.exe
                      "C:\Windows\SysWOW64\mshta.exe"
                      4⤵
                        PID:1424
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                        4⤵
                          PID:824

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe

                    Filesize

                    1.0MB

                    MD5

                    b153044cf36a027e19eb94b06003f09c

                    SHA1

                    9c5137654c78d249b318d7612a4d3dd2710c3aea

                    SHA256

                    cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                    SHA512

                    ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                  • C:\Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe

                    Filesize

                    1.0MB

                    MD5

                    b153044cf36a027e19eb94b06003f09c

                    SHA1

                    9c5137654c78d249b318d7612a4d3dd2710c3aea

                    SHA256

                    cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                    SHA512

                    ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                  • C:\Users\Admin\AppData\Local\Temp\10_68\oshcddl.okk

                    Filesize

                    148.0MB

                    MD5

                    89f8d30673e4bab942af08e876b55f6a

                    SHA1

                    e4eb6c563e7f5943dd1f97f25aa1395c9d282c4d

                    SHA256

                    2929db20100a5fdd379450408141be4002f9bd98b27f91236b1e8588c0a5eb21

                    SHA512

                    b64d014325756188366713830a3788ffefe5b0f12dfb3077034ead6952f4863e42580b276b7b4ffb097ba780f21885b4bfe510488e9d162f9c8c64a8c848757d

                  • C:\Users\Admin\AppData\Local\Temp\10_68\uikvsw.pke

                    Filesize

                    191KB

                    MD5

                    543c15dd13ea7501882bc01ec38d0a88

                    SHA1

                    364a6166e0f477fd059f30223d1cbd5ada888347

                    SHA256

                    05d7daee9691503daf1ac45d2c66a3959e53eed8f5e855e7de27d386dc45696a

                    SHA512

                    6feb1e0edba670e7addf9662062e38b22d6904b1bc21183269673b13df24d7fff2f75df72e166c1b8eb66d55e8ff3819993981949588d384cb944f654b1e21ac

                  • C:\Users\Admin\AppData\Local\Temp\10_68\xpusgr.dll

                    Filesize

                    74KB

                    MD5

                    69f8df46f9700d923d0c306d9257c609

                    SHA1

                    5ff4af179f6ba1c2afc5ee1e498c5d485d5585fe

                    SHA256

                    e9e2092a5b41ff93a68bd98541aa1cc0dc3de3457a42990cb9c73d00b43fb3ac

                    SHA512

                    ba563be78df9854c783b270281f3996eba7aeaa235c23c7d88431e4d627a617272df20d9d5c52759e1a4ee9de1c9f43f48783ee803139a05649a65755178ef83

                  • C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe

                    Filesize

                    469KB

                    MD5

                    a1a3a833a1b5ee29692fac886b8c1922

                    SHA1

                    6c82c2d7ac2c340e184ac96bb3c115e72310fe93

                    SHA256

                    9fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4

                    SHA512

                    27088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090

                  • C:\Users\Admin\AppData\Local\Temp\rfil.js

                    Filesize

                    3KB

                    MD5

                    6c705c7ee0ce269b3e6eb770b797e808

                    SHA1

                    e8c6540e4dbb6a464e1f0c2c59cab161f44a8705

                    SHA256

                    dbd1b9421d8634cc2af6ae9c4fe72891bd3139527730185d2e28afe0447b4e2e

                    SHA512

                    0999401d3218986eac63b8e449a572cdd5aec382fac11a6aa86b6a4035107b75343f6f005d506322c0a0e853c7566cf49078991d93cadfab1e80fad8ed1d93e2

                  • C:\Users\Admin\AppData\Local\temp\10_68\dwganrrebc.vbe

                    Filesize

                    27KB

                    MD5

                    69c99f6b7d4c2d4ea665ab552e39447f

                    SHA1

                    f018b0a94cd63b9f134aac4313ecb30843b0dc84

                    SHA256

                    884f4b15c1bbcd236b485bebeb0523ff3158afbf66cc81c38394fdd5e89f09c2

                    SHA512

                    9feb8ca4dcd2ea72e71422800c68b7a0d34026328215565addb8dba3a097a87dfa61b9aa701ebc331257696930d03b9e718a00ed45f354668d48ae1892939a3b

                  • \Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • \Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • \Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • \Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • \Users\Admin\AppData\Local\Temp\10_68\Dropperremvom.exe

                    Filesize

                    484KB

                    MD5

                    a4c95311e65e2dea102ab354fd2ce363

                    SHA1

                    dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                    SHA256

                    40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                    SHA512

                    927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                  • \Users\Admin\AppData\Local\Temp\10_68\axkjridon.exe

                    Filesize

                    1.0MB

                    MD5

                    b153044cf36a027e19eb94b06003f09c

                    SHA1

                    9c5137654c78d249b318d7612a4d3dd2710c3aea

                    SHA256

                    cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                    SHA512

                    ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                  • \Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe

                    Filesize

                    469KB

                    MD5

                    a1a3a833a1b5ee29692fac886b8c1922

                    SHA1

                    6c82c2d7ac2c340e184ac96bb3c115e72310fe93

                    SHA256

                    9fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4

                    SHA512

                    27088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090

                  • \Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe

                    Filesize

                    469KB

                    MD5

                    a1a3a833a1b5ee29692fac886b8c1922

                    SHA1

                    6c82c2d7ac2c340e184ac96bb3c115e72310fe93

                    SHA256

                    9fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4

                    SHA512

                    27088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090

                  • memory/1800-54-0x0000000075771000-0x0000000075773000-memory.dmp

                    Filesize

                    8KB