Analysis
-
max time kernel
159s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
Scan Copy06.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Scan Copy06.js
Resource
win10v2004-20221111-en
General
-
Target
Scan Copy06.js
-
Size
873KB
-
MD5
90a8d36688fde3d0e06e101388baf1e1
-
SHA1
f36ba8657a332a72996c5aee51d3af45a68bbcb5
-
SHA256
6a9869c98547c0566c4f3462ab529cc0a72e9c5f35f5767773575196f68f44ab
-
SHA512
492e5d2e7a3a05906b6a521f6e6c8dafb6c32fd6da2a4075d69429f1750053302e81e96d5e282cd7281b3f9d53586f104ee6afbc59398d2d7b918e97d693c0dd
-
SSDEEP
12288:nBi1CUqtHhlYWwP2r0dNB8wDzyNfQyp/Yx76SKFRtYFhAc/kdP1WgZwfraDCa:nBizUDOyid0p
Malware Config
Extracted
remcos
RemoteHost
45.139.105.174:3132
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Y0T2QT
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2348 wscript.exe 19 2348 wscript.exe 36 2348 wscript.exe 58 2348 wscript.exe 73 2348 wscript.exe 88 2348 wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 pwer.exe 4476 remcos.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation pwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TwZstDnUOX.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TwZstDnUOX.js wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" pwer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ pwer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" pwer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4476 set thread context of 672 4476 remcos.exe 94 PID 672 set thread context of 3604 672 iexplore.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings pwer.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 116 reg.exe 1496 reg.exe 5052 reg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4476 remcos.exe 672 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 672 iexplore.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 860 wrote to memory of 2348 860 wscript.exe 83 PID 860 wrote to memory of 2348 860 wscript.exe 83 PID 860 wrote to memory of 2652 860 wscript.exe 84 PID 860 wrote to memory of 2652 860 wscript.exe 84 PID 860 wrote to memory of 2652 860 wscript.exe 84 PID 2652 wrote to memory of 5016 2652 pwer.exe 85 PID 2652 wrote to memory of 5016 2652 pwer.exe 85 PID 2652 wrote to memory of 5016 2652 pwer.exe 85 PID 5016 wrote to memory of 116 5016 cmd.exe 87 PID 5016 wrote to memory of 116 5016 cmd.exe 87 PID 5016 wrote to memory of 116 5016 cmd.exe 87 PID 2652 wrote to memory of 3248 2652 pwer.exe 88 PID 2652 wrote to memory of 3248 2652 pwer.exe 88 PID 2652 wrote to memory of 3248 2652 pwer.exe 88 PID 3248 wrote to memory of 4268 3248 WScript.exe 89 PID 3248 wrote to memory of 4268 3248 WScript.exe 89 PID 3248 wrote to memory of 4268 3248 WScript.exe 89 PID 4268 wrote to memory of 4476 4268 cmd.exe 91 PID 4268 wrote to memory of 4476 4268 cmd.exe 91 PID 4268 wrote to memory of 4476 4268 cmd.exe 91 PID 4476 wrote to memory of 2436 4476 remcos.exe 92 PID 4476 wrote to memory of 2436 4476 remcos.exe 92 PID 4476 wrote to memory of 2436 4476 remcos.exe 92 PID 4476 wrote to memory of 672 4476 remcos.exe 94 PID 4476 wrote to memory of 672 4476 remcos.exe 94 PID 4476 wrote to memory of 672 4476 remcos.exe 94 PID 4476 wrote to memory of 672 4476 remcos.exe 94 PID 2436 wrote to memory of 1496 2436 cmd.exe 96 PID 2436 wrote to memory of 1496 2436 cmd.exe 96 PID 2436 wrote to memory of 1496 2436 cmd.exe 96 PID 672 wrote to memory of 1160 672 iexplore.exe 95 PID 672 wrote to memory of 1160 672 iexplore.exe 95 PID 672 wrote to memory of 1160 672 iexplore.exe 95 PID 672 wrote to memory of 3604 672 iexplore.exe 98 PID 672 wrote to memory of 3604 672 iexplore.exe 98 PID 672 wrote to memory of 3604 672 iexplore.exe 98 PID 672 wrote to memory of 3604 672 iexplore.exe 98 PID 1160 wrote to memory of 5052 1160 cmd.exe 99 PID 1160 wrote to memory of 5052 1160 cmd.exe 99 PID 1160 wrote to memory of 5052 1160 cmd.exe 99
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Scan Copy06.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\TwZstDnUOX.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:2348
-
-
C:\Users\Admin\AppData\Roaming\pwer.exe"C:\Users\Admin\AppData\Roaming\pwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:116
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fnkmtlwmzyyxpattzrfffgri.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- Modifies registry key
PID:1496
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- Modifies registry key
PID:5052
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:3604
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
386B
MD51ec6289c6fd4c2ded6b2836ed28cbeb5
SHA1c4e08195e6c640eb8860acc03fda1d649b4fe070
SHA2566efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2
SHA51220bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288
-
Filesize
10KB
MD52e3decd57f43555d3d49623771f470f5
SHA1ed2341ea6a3cfcbd2741404a13a22faded1920ba
SHA256dcdbd17e3f9939f07f9438dc1cb6dab0ef36710553af33d3d09f2f27d58aaae3
SHA512708510e75684765d59774ea3c964b2b970411f0b865adcd953bb1a9777d666b8909dd268c26a85b6e732d0246ae1173b79572ee19cf894df6e04cf7afbb81c83
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81
-
Filesize
470KB
MD5cf76154a7257f8447b77350760a59481
SHA1554ee677ee627f9361156e5d9e52c944d9eed971
SHA256b55e1430bc8fd56b53d40e8dc1bb4a176f37f5d5b202fdbd6ea7ced8b73434ba
SHA51232807dd9f6a82fda74e4057df65a6682fb2e97565d819dac2a6eb2aac2e15935417703e5c9ab9d3c30123980dd37e8677c982796736c15778d7fe468a260ed81