Analysis

  • max time kernel
    298s
  • max time network
    286s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 03:39

General

  • Target

    dc1034a26e7c697b316a3e8eb51dfe68698a5ee294027823fc4647bae25694e4.exe

  • Size

    732KB

  • MD5

    d0a5cfb0d5be26a0ac372b6b56731760

  • SHA1

    2c4d9df430e1a195dbbf96e09f8b65f3ed2527dd

  • SHA256

    dc1034a26e7c697b316a3e8eb51dfe68698a5ee294027823fc4647bae25694e4

  • SHA512

    5dbe3d37630bad98a4541318ec1fe65744fa30c2bc4fb643c85b5c2ed60644e882dc9f4ad5d67b1214dc729f142e4c5ca32ad3a994238e47237f86ef87aa5e15

  • SSDEEP

    12288:Sm8dE6B0SgzEdcybiZERg9nAPRgrEUdZfYozLUs8DrDMdmBKCYGHiB03WNaByzlx:Sm8RqZ4bBa5wUde6ULYmJPHiB0GNaByT

Malware Config

Extracted

Family

remcos

Botnet

Main

C2

109.206.243.58:4541

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    15

  • connect_interval

    3

  • copy_file

    jdk.exe

  • copy_folder

    Java

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %UserProfile%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Main-IJCWI4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Java Updater

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc1034a26e7c697b316a3e8eb51dfe68698a5ee294027823fc4647bae25694e4.exe
    "C:\Users\Admin\AppData\Local\Temp\dc1034a26e7c697b316a3e8eb51dfe68698a5ee294027823fc4647bae25694e4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Windows\SYSWOW64\cmd.exe
      "C:\Windows\SYSWOW64\cmd.exe"
      2⤵
      • Blocklisted process makes network request
      PID:1740

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1336-54-0x0000000000D00000-0x0000000000DBC000-memory.dmp
    Filesize

    752KB

  • memory/1336-55-0x0000000000C30000-0x0000000000CEA000-memory.dmp
    Filesize

    744KB

  • memory/1740-56-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1740-57-0x000000000043292E-mapping.dmp
  • memory/1740-59-0x00000000762D1000-0x00000000762D3000-memory.dmp
    Filesize

    8KB

  • memory/1740-60-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1740-61-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1740-62-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB