Analysis

  • max time kernel
    168s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 08:31

General

  • Target

    baf27b1b589493b321327ad405860cfa.PDF.js

  • Size

    854KB

  • MD5

    b95f5a006ab0d3005e759dac083f05bf

  • SHA1

    9d59fb8f939cb75ad7cfb5b2305becbf2f2faa3b

  • SHA256

    5ae79021c1b884a698e1e18800c12bc63fb4a0211191d13dd63a0b83bd288834

  • SHA512

    4fa570b248361ceb0439e7e6d1b8694a4a9f41da1cf7c6f9a4682f6b0350fc036410fa087396e0c067781f36ee9865b41837b2dfc31077ca085c143b71132f63

  • SSDEEP

    12288:hd7rWxNU+xsAXb04bURgKtWmez1i+xL8Z7ENZQHHNe9LEhHXxGZe6M3kRM:bsLGPtWt1GGE5

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

84.21.172.33:5763

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    uac.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-AG7QM3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 2 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 4 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\baf27b1b589493b321327ad405860cfa.PDF.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\LVHNGQKglC.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:4736
    • C:\Users\Admin\AppData\Roaming\remcos_a.exe
      "C:\Users\Admin\AppData\Roaming\remcos_a.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:1888
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bhzmuytbwrdohxlhggwurlayeelfewqvn.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\uac.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\ProgramData\Remcos\uac.exe
            C:\ProgramData\Remcos\uac.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\SysWOW64\cmd.exe
              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1556
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                7⤵
                • UAC bypass
                • Modifies registry key
                PID:1236
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              6⤵
                PID:3824
              • C:\ProgramData\Remcos\uac.exe
                C:\ProgramData\Remcos\uac.exe /stext "C:\Users\Admin\AppData\Local\Temp\npztvevqhauncmsohtxgarcxvdpqkd"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1604
              • C:\ProgramData\Remcos\uac.exe
                C:\ProgramData\Remcos\uac.exe /stext "C:\Users\Admin\AppData\Local\Temp\pjelwwfkvimreahsqdjhlexgekzzlozhv"
                6⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook accounts
                PID:2316
              • C:\ProgramData\Remcos\uac.exe
                C:\ProgramData\Remcos\uac.exe /stext "C:\Users\Admin\AppData\Local\Temp\aljex"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Remcos\uac.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\ProgramData\Remcos\uac.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\ProgramData\Remcos\uac.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\ProgramData\Remcos\uac.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\ProgramData\Remcos\uac.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\Users\Admin\AppData\Local\Temp\bhzmuytbwrdohxlhggwurlayeelfewqvn.vbs

      Filesize

      380B

      MD5

      7b8772bb10bd0b5381f26c961f6d2768

      SHA1

      ad8bdcb8251394e87f5599abdb0bc2334f65eb12

      SHA256

      0bb9b2e1d903edf86f15874531f3ceea186e953ab8f8489ecd601fd7eac5b457

      SHA512

      bff73e04eb175c741a733c48a3bb38821d26d470e9b25ee0c18b1b7d0ccf850d57a9cee94843016c78e17f6859ca86dd6b4ea59296ed7b0022d7cf915a743a75

    • C:\Users\Admin\AppData\Local\Temp\npztvevqhauncmsohtxgarcxvdpqkd

      Filesize

      4KB

      MD5

      07c14121728256ad56b1ef039a28e4a6

      SHA1

      0f39e1e02cd5e2b1b22d9e5470757ae13fe96738

      SHA256

      8d46702077d776b04085cbe5ce2f0e5971595ea4e11b025a215c4379e7fc18f8

      SHA512

      03d9113095e7b6143c4f99b131462fa451a9c2d7e841461603dace64bd6d525cb63d074384d2b3ff285a7183116f1715138beeb756fced9a6b1ad6fde36d4789

    • C:\Users\Admin\AppData\Roaming\LVHNGQKglC.js

      Filesize

      6KB

      MD5

      2490d18d20446428bf268469fc962401

      SHA1

      516058fd1b37a8f198025ac528e448d374ce49ea

      SHA256

      ee6ee90d1d5e6d0a3213f845766a9ace1a75e4648c10e239d2940f726e31f477

      SHA512

      213a028abbdd4c69eda5aaa0398aec88fc595c2f581d14345ca3cfbc0cdf3df48486984ccef3d48fc22c815a2db570c7165844b82b4f111a8bab52a5b729dfc9

    • C:\Users\Admin\AppData\Roaming\remcos_a.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • C:\Users\Admin\AppData\Roaming\remcos_a.exe

      Filesize

      470KB

      MD5

      d7eda792cc905481af5f73aa23dcfbcb

      SHA1

      24bacf412ca6befbaf27703019ab3aafa0e52596

      SHA256

      da59632417e4b72af2be17400c9f5cbbc8207542de1781ab5f69657d2c85f108

      SHA512

      0891b69a550e5a8daf48be8c2eb2e47eac092e564d696d8fb83103ee2c4efa358c9069ac22635d971f4e23fa3f3dab33ff261fd14bfe9ed9ad83f4c2588f56da

    • memory/224-142-0x0000000000000000-mapping.dmp

    • memory/1236-147-0x0000000000000000-mapping.dmp

    • memory/1556-145-0x0000000000000000-mapping.dmp

    • memory/1604-157-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1604-149-0x0000000000000000-mapping.dmp

    • memory/1604-158-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1888-138-0x0000000000000000-mapping.dmp

    • memory/2116-155-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2116-153-0x0000000000000000-mapping.dmp

    • memory/2316-156-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2316-151-0x0000000000000000-mapping.dmp

    • memory/2324-139-0x0000000000000000-mapping.dmp

    • memory/3824-148-0x0000000001200000-0x000000000127F000-memory.dmp

      Filesize

      508KB

    • memory/3824-146-0x0000000000000000-mapping.dmp

    • memory/4200-141-0x0000000000000000-mapping.dmp

    • memory/4240-134-0x0000000000000000-mapping.dmp

    • memory/4736-132-0x0000000000000000-mapping.dmp

    • memory/4988-137-0x0000000000000000-mapping.dmp