Analysis

  • max time kernel
    152s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 06:40

General

  • Target

    cedca3fdf7c71fbd38e6edacb60b8b46dcd773f7b347abdd46b4f9e702c80d3f.xls

  • Size

    1.1MB

  • MD5

    ebec43025b80c13f6cb6f824f1d84679

  • SHA1

    6864ebeffa646f31672caabeba732d6612986d8a

  • SHA256

    cedca3fdf7c71fbd38e6edacb60b8b46dcd773f7b347abdd46b4f9e702c80d3f

  • SHA512

    a7175ab34e9d67a18719d347bd86dc59f102c2ba96da8a1a7fc62705913deb6d57e38fdb111a598a931fbf851215e3e07b74e6c679cd798f93c36f0602118033

  • SSDEEP

    24576:Kbqr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXImNr5XXXXXXXXXXXXUXXXXXXXSXXXt:zaif2E

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

anothertry

C2

mazhararyousaf.ddns.net:52046

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-G0MHSX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\cedca3fdf7c71fbd38e6edacb60b8b46dcd773f7b347abdd46b4f9e702c80d3f.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1552
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-Date
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:676
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwAwAA==
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
      • C:\Users\Public\vbc.exe
        C:\Users\Public\vbc.exe
        3⤵
        • Executes dropped EXE
        PID:1040
      • C:\Users\Public\vbc.exe
        C:\Users\Public\vbc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1624

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    781c0ab5dc81a5ac4450d7f751aeccc2

    SHA1

    d6e1a69bf18af2e99adcd217f41d5d0bbce29cd4

    SHA256

    e929bcbc8300ce3be9a3593ad8e601195bb4ff127ca3cb4044586593d2d992eb

    SHA512

    675cfdbcabab50d16e7d7e8dabea08e67fc3337d46d5f4e09c09d75a731122deee77c195a640009812d8aa182fbe9b9c12b02b0e48ddd73bf84a0f12798b539a

  • C:\Users\Public\vbc.exe
    Filesize

    2.2MB

    MD5

    1a52cfd9752ab0dd589be194a928d402

    SHA1

    1223795aeff0d07a115665ff1b2268337b752395

    SHA256

    ad45a0b57ebfc39c8d7595c6f4ff17afc4068654ebd66d86cd5c359cf033efd8

    SHA512

    5bc67b5e1ab190651b189e878ec05594a7c44744f4150159b7ccda66b6540e191a2880367b591c7acb9c8040390ce81195079e63d97e1f8bd02567210c363126

  • C:\Users\Public\vbc.exe
    Filesize

    2.2MB

    MD5

    1a52cfd9752ab0dd589be194a928d402

    SHA1

    1223795aeff0d07a115665ff1b2268337b752395

    SHA256

    ad45a0b57ebfc39c8d7595c6f4ff17afc4068654ebd66d86cd5c359cf033efd8

    SHA512

    5bc67b5e1ab190651b189e878ec05594a7c44744f4150159b7ccda66b6540e191a2880367b591c7acb9c8040390ce81195079e63d97e1f8bd02567210c363126

  • C:\Users\Public\vbc.exe
    Filesize

    2.2MB

    MD5

    1a52cfd9752ab0dd589be194a928d402

    SHA1

    1223795aeff0d07a115665ff1b2268337b752395

    SHA256

    ad45a0b57ebfc39c8d7595c6f4ff17afc4068654ebd66d86cd5c359cf033efd8

    SHA512

    5bc67b5e1ab190651b189e878ec05594a7c44744f4150159b7ccda66b6540e191a2880367b591c7acb9c8040390ce81195079e63d97e1f8bd02567210c363126

  • C:\Users\Public\vbc.exe
    Filesize

    2.2MB

    MD5

    1a52cfd9752ab0dd589be194a928d402

    SHA1

    1223795aeff0d07a115665ff1b2268337b752395

    SHA256

    ad45a0b57ebfc39c8d7595c6f4ff17afc4068654ebd66d86cd5c359cf033efd8

    SHA512

    5bc67b5e1ab190651b189e878ec05594a7c44744f4150159b7ccda66b6540e191a2880367b591c7acb9c8040390ce81195079e63d97e1f8bd02567210c363126

  • \Users\Public\vbc.exe
    Filesize

    2.2MB

    MD5

    1a52cfd9752ab0dd589be194a928d402

    SHA1

    1223795aeff0d07a115665ff1b2268337b752395

    SHA256

    ad45a0b57ebfc39c8d7595c6f4ff17afc4068654ebd66d86cd5c359cf033efd8

    SHA512

    5bc67b5e1ab190651b189e878ec05594a7c44744f4150159b7ccda66b6540e191a2880367b591c7acb9c8040390ce81195079e63d97e1f8bd02567210c363126

  • memory/676-65-0x0000000000000000-mapping.dmp
  • memory/676-71-0x0000000002550000-0x0000000002593000-memory.dmp
    Filesize

    268KB

  • memory/676-68-0x0000000067FA0000-0x000000006854B000-memory.dmp
    Filesize

    5.7MB

  • memory/676-72-0x0000000067FA0000-0x000000006854B000-memory.dmp
    Filesize

    5.7MB

  • memory/1288-78-0x0000000073290000-0x000000007383B000-memory.dmp
    Filesize

    5.7MB

  • memory/1288-77-0x0000000073290000-0x000000007383B000-memory.dmp
    Filesize

    5.7MB

  • memory/1288-79-0x0000000073290000-0x000000007383B000-memory.dmp
    Filesize

    5.7MB

  • memory/1288-74-0x0000000000000000-mapping.dmp
  • memory/1552-70-0x0000000072A9D000-0x0000000072AA8000-memory.dmp
    Filesize

    44KB

  • memory/1552-58-0x0000000075C81000-0x0000000075C83000-memory.dmp
    Filesize

    8KB

  • memory/1552-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1552-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1552-55-0x0000000071AB1000-0x0000000071AB3000-memory.dmp
    Filesize

    8KB

  • memory/1552-54-0x000000002F2A1000-0x000000002F2A4000-memory.dmp
    Filesize

    12KB

  • memory/1552-57-0x0000000072A9D000-0x0000000072AA8000-memory.dmp
    Filesize

    44KB

  • memory/1624-87-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-88-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-81-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-82-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-84-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-86-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-99-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-98-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-89-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-91-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-93-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1624-94-0x000000000043292E-mapping.dmp
  • memory/2028-61-0x0000000000000000-mapping.dmp
  • memory/2028-73-0x00000000059E0000-0x0000000005C1C000-memory.dmp
    Filesize

    2.2MB

  • memory/2028-64-0x0000000001060000-0x00000000012A0000-memory.dmp
    Filesize

    2.2MB