Analysis

  • max time kernel
    150s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2022, 08:02

General

  • Target

    e70d59aaab1fda4f504e32e547329a5b.exe

  • Size

    596KB

  • MD5

    e70d59aaab1fda4f504e32e547329a5b

  • SHA1

    ccac646868b072edac45d52afad293b21d6f6f6c

  • SHA256

    65054687e67c867b4f3a1fe66888dbc1e43f1152d44ba8a82e98f4374d54ec1d

  • SHA512

    10263b2d2a9a518dc99fadc7e7746d349706a188ee95f8f0be0d2713060a8683e2d6abe0d25060bec8078315176570ca84996ef99b589dfb76d92e3a483bb9a9

  • SSDEEP

    12288:R/Jd9DZtfiv/gaORm9ZpSjV6BK6KFuApvsch/U2Ci/4m:lHnZUpSjoBK6KQLcZU2NQm

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45.137.22.236:5890

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    windows-P9KT1G

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 16 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 55 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e70d59aaab1fda4f504e32e547329a5b.exe
    "C:\Users\Admin\AppData\Local\Temp\e70d59aaab1fda4f504e32e547329a5b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\e70d59aaab1fda4f504e32e547329a5b.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sycxbhdfhdhstem.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:956
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:4207618 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1680
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275470 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1624
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:472090 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1708
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:603180 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2220
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275529 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2512
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:865361 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2892
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:1324089 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2148
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:1258570 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2712
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:960
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          3⤵
            PID:1588
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            3⤵
              PID:948
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              3⤵
                PID:1368
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                3⤵
                  PID:2132
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  3⤵
                    PID:2212
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    3⤵
                      PID:2424
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      3⤵
                        PID:2504
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        3⤵
                          PID:2776
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          3⤵
                            PID:2880
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            3⤵
                              PID:1684
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              3⤵
                                PID:2156
                              • C:\Windows\SysWOW64\svchost.exe
                                svchost.exe
                                3⤵
                                  PID:596
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  3⤵
                                    PID:2744

                              Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FI3SE4KL.txt

                                      Filesize

                                      603B

                                      MD5

                                      6f10d03cf1fecbf4aae7c2a955a01b5d

                                      SHA1

                                      684f34ca35ba62ab8a2ad3036222403f5af57c48

                                      SHA256

                                      18c60c9da7bc314ce930fcb97202ac64dcb233b63879a363b177a81852a223ac

                                      SHA512

                                      0ce1e4734357f2b6e18c7c346cd901eaedbb5fff304304fa37e7c602e80a64abfd08b89aba462b25e3df26e15a448a6bf919e67fe2dedbfc44bfcd3e17e3c514

                                    • memory/1512-78-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-59-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-66-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-67-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-65-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-69-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-71-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-75-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-62-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-86-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-64-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1512-60-0x0000000000400000-0x000000000047F000-memory.dmp

                                      Filesize

                                      508KB

                                    • memory/1580-79-0x000000006FA40000-0x000000006FFEB000-memory.dmp

                                      Filesize

                                      5.7MB

                                    • memory/1580-80-0x000000006FA40000-0x000000006FFEB000-memory.dmp

                                      Filesize

                                      5.7MB

                                    • memory/1624-54-0x0000000001200000-0x0000000001298000-memory.dmp

                                      Filesize

                                      608KB

                                    • memory/1624-58-0x00000000004C0000-0x00000000004DC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/1624-55-0x0000000076041000-0x0000000076043000-memory.dmp

                                      Filesize

                                      8KB