Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 11:48

General

  • Target

    21f6a18eab7f51f18819cbf97f353e32e2a2f11de7c0b8c8523eb7c90ea36b8b.exe

  • Size

    774KB

  • MD5

    2479c3d14c7d3127b996787da9222db4

  • SHA1

    46a343df094095b8edfcf85f7f5604c9b5619feb

  • SHA256

    21f6a18eab7f51f18819cbf97f353e32e2a2f11de7c0b8c8523eb7c90ea36b8b

  • SHA512

    f118b9e83452722f8c0ae14b6c6622b3eaf4605a0fd927f26c744ed8c30c52aae210c246f3ab3ca3574e49767e65c55485d300916faeaed5aef88d0f17bc0642

  • SSDEEP

    24576:WloNG3Dp09hOX3Mq3jaXhMsFjCshXMQJvTEzNksiD1:WV3DW9hWcqT8Xh8EbG

Malware Config

Extracted

Family

remcos

Botnet

sunshine

C2

sunshine08.ddns.net:5687

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-BQS99W

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21f6a18eab7f51f18819cbf97f353e32e2a2f11de7c0b8c8523eb7c90ea36b8b.exe
    "C:\Users\Admin\AppData\Local\Temp\21f6a18eab7f51f18819cbf97f353e32e2a2f11de7c0b8c8523eb7c90ea36b8b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:340993 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1532
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:276
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:2
            5⤵
            • Suspicious use of SetWindowsHookEx
            PID:1644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:603147 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2220
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:406554 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2416
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:668713 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2660
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:472099 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1524
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1820
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1688
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:4207618 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1996
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:1484
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          3⤵
            PID:272
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            3⤵
              PID:1988
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              3⤵
                PID:2228
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                3⤵
                  PID:2408
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  3⤵
                    PID:2604
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    3⤵
                      PID:2652
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      3⤵
                        PID:2928
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        3⤵
                          PID:2972
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          3⤵
                            PID:3060
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            3⤵
                              PID:2360

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Defense Evasion

                        Modify Registry

                        2
                        T1112

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5BDC21B1-7564-11ED-85E0-FE41811C61F5}.dat
                          Filesize

                          3KB

                          MD5

                          9f3cc3cf6afa506c1c6b05ca855d48e2

                          SHA1

                          0d11f9bfe79b06eb872a4cc06b3c01da7b31226f

                          SHA256

                          2db925d96048aeecb44a459dc6feefcd2198f9a3adcc2ceeb33b03a8c0844971

                          SHA512

                          7542438ccdc17637df7b460baf86b30479cb7951e6cb08719862214d95a58b07734db521e34a945e75d672eaaba418a73f6aea992cb2ba82ce5823a6aa9ef936

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5BDC21B1-7564-11ED-85E0-FE41811C61F5}.dat
                          Filesize

                          5KB

                          MD5

                          c453edcec4d618b02340007a8ebae911

                          SHA1

                          2ac241259da66753270b2e7e80f03a8fc19768e2

                          SHA256

                          3cdfbd5211389b9f090d0135bb9dad43e216706fc46cf038553dfca00cc1d594

                          SHA512

                          566ce4aa5eade82fa4881aaa1133bc9d1fc3ee4477a06105432dcd0ed8dc013f57fea821d94e6d3c236238888db6584e241ecd91302db1b0ea100b171fa90d92

                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5DF3B711-7564-11ED-85E0-FE41811C61F5}.dat
                          Filesize

                          5KB

                          MD5

                          cfd0b0c16551ae93afb47243dc938512

                          SHA1

                          92db775726a6c9a849529e3421d543369c228aa1

                          SHA256

                          f18a13833145ae2f4d6261b97346a1ef862cb8560e927630f36fc244a0ceac70

                          SHA512

                          9df0b5304271c95bebca7338c5f5e3ce88942e46e890999d0cb741e0392dbd919500a4350d7c1caabc0ffe3f157146514159e438da569c62de9a70c8583bdcd5

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OG7KIV03.txt
                          Filesize

                          608B

                          MD5

                          d0a5b3b6b430752986cedbc99be272c4

                          SHA1

                          7363cfda714370b697d9eecd093bd7154ac11332

                          SHA256

                          410a724fbdba735e3b95927395d1918628cd3262ad747905e8664e608d7f8dc5

                          SHA512

                          795ff6c4b26f39809f25bdf3fbc044a070181581d2f4c98c5ca6262baea8a00a91ed7605de3274dd01c405b7e0136c2d36e4f360f6a0b391406d3242c54bb3ec

                        • memory/272-76-0x000000000009768E-mapping.dmp
                        • memory/816-57-0x000000001B110000-0x000000001B1C8000-memory.dmp
                          Filesize

                          736KB

                        • memory/816-56-0x000000001A6D0000-0x000000001A78A000-memory.dmp
                          Filesize

                          744KB

                        • memory/816-54-0x0000000000B90000-0x0000000000C54000-memory.dmp
                          Filesize

                          784KB

                        • memory/816-55-0x0000000000AD0000-0x0000000000B8C000-memory.dmp
                          Filesize

                          752KB

                        • memory/868-69-0x000000000011768E-mapping.dmp
                        • memory/1068-67-0x000000000009768E-mapping.dmp
                        • memory/1484-71-0x000000000009768E-mapping.dmp
                        • memory/1656-63-0x000000000009768E-mapping.dmp
                        • memory/1736-62-0x0000000000400000-0x000000000047F000-memory.dmp
                          Filesize

                          508KB

                        • memory/1736-58-0x0000000000400000-0x000000000047F000-memory.dmp
                          Filesize

                          508KB

                        • memory/1736-64-0x0000000000400000-0x000000000047F000-memory.dmp
                          Filesize

                          508KB

                        • memory/1736-61-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
                          Filesize

                          8KB

                        • memory/1736-59-0x000000000043292E-mapping.dmp
                        • memory/1736-66-0x0000000000400000-0x000000000047F000-memory.dmp
                          Filesize

                          508KB

                        • memory/1988-78-0x000000000009768E-mapping.dmp
                        • memory/2228-80-0x00000000000D768E-mapping.dmp
                        • memory/2360-95-0x000000000009768E-mapping.dmp
                        • memory/2408-82-0x000000000009768E-mapping.dmp
                        • memory/2604-84-0x000000000009768E-mapping.dmp
                        • memory/2652-86-0x000000000009768E-mapping.dmp
                        • memory/2928-89-0x000000000009768E-mapping.dmp
                        • memory/2972-91-0x000000000012768E-mapping.dmp
                        • memory/3060-93-0x00000000000E768E-mapping.dmp