Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2023 05:26

General

  • Target

    5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b.exe

  • Size

    1.1MB

  • MD5

    b80414e3202a808673a8254aec607a12

  • SHA1

    fef5c52c3af36689f3c794ce586d83b0a458afa5

  • SHA256

    5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b

  • SHA512

    3e1a4e4918b2b64238403811348248ff5955793cf405087edaac332461c74ee3d26b21f814565d22ae4f30cc4436821ac7f9fcdc61cae38d1ce8adf3ff2609b3

  • SSDEEP

    24576:ZH14Ct7BwWTmQHsOzj4j85M1hUQDAxzJX4K4hGxosG:ZHGW7BwWtsOzj4jGM1aK4FX3

Malware Config

Extracted

Family

remcos

Botnet

NEW REM STUB

C2

valvesco.duckdns.org:5050

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-48V73L

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b.exe
    "C:\Users\Admin\AppData\Local\Temp\5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\mnvcbn .exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 10
        3⤵
        • Runs ping.exe
        PID:536
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\mnvcbn .exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:2932
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 18 > nul && copy "C:\Users\Admin\AppData\Local\Temp\5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b.exe" "C:\Users\Admin\AppData\Roaming\mnvcbn .exe" && ping 127.0.0.1 -n 18 > nul && "C:\Users\Admin\AppData\Roaming\mnvcbn .exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:260
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 18
        3⤵
        • Runs ping.exe
        PID:4592
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 18
        3⤵
        • Runs ping.exe
        PID:3184
      • C:\Users\Admin\AppData\Roaming\mnvcbn .exe
        "C:\Users\Admin\AppData\Roaming\mnvcbn .exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
            PID:3208
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
              PID:4524
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              4⤵
                PID:2340
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                4⤵
                • Suspicious use of SetWindowsHookEx
                PID:1404
              • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe
                "C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe"
                4⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1104
                • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe
                  "C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4436

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Winlogon Helper DLL

        1
        T1004

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ mnvcbnqa.exe.log
          Filesize

          1KB

          MD5

          7dca233df92b3884663fa5a40db8d49c

          SHA1

          208b8f27b708c4e06ac37f974471cc7b29c29b60

          SHA256

          90c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c

          SHA512

          d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe
          Filesize

          76KB

          MD5

          0e362e7005823d0bec3719b902ed6d62

          SHA1

          590d860b909804349e0cdc2f1662b37bd62f7463

          SHA256

          2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

          SHA512

          518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe
          Filesize

          76KB

          MD5

          0e362e7005823d0bec3719b902ed6d62

          SHA1

          590d860b909804349e0cdc2f1662b37bd62f7463

          SHA256

          2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

          SHA512

          518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.exe
          Filesize

          76KB

          MD5

          0e362e7005823d0bec3719b902ed6d62

          SHA1

          590d860b909804349e0cdc2f1662b37bd62f7463

          SHA256

          2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

          SHA512

          518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.txt
          Filesize

          56B

          MD5

          564d83bed78cfedce4d501551e1c6395

          SHA1

          9b9772eeec566bb340303e73984e4927de2fa92c

          SHA256

          0087d4863087e9a8e0638445cc86e05ccd27306b647ee3e5df9f94c57a39430f

          SHA512

          51c0e5dab71b8213dd04272e51269929bb4343cabc62d5fae449bc450464ca5d957936af891207c5087436b6d0a09100cccb5759b291fa46e3e980663856ceb3

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.txt
          Filesize

          56B

          MD5

          9abdf38dcb61132f63e82b56b96fbe7a

          SHA1

          bfdff1c1405586a7bdb411de42e1623abbfbe18c

          SHA256

          8ec47acca3e62b5b8383fae304a6cebab05adef21b7fd001f4873e1bb519dbe1

          SHA512

          8d13e799577dc13da15d6bc10921c780dd1702bbdf12c04c1c9de0b6bb3019cb149d884364102d72052785fd042b143c98313e19c9c484ab1173738f439c56ab

        • C:\Users\Admin\AppData\Local\Temp\ mnvcbnqa.txt
          Filesize

          56B

          MD5

          9abdf38dcb61132f63e82b56b96fbe7a

          SHA1

          bfdff1c1405586a7bdb411de42e1623abbfbe18c

          SHA256

          8ec47acca3e62b5b8383fae304a6cebab05adef21b7fd001f4873e1bb519dbe1

          SHA512

          8d13e799577dc13da15d6bc10921c780dd1702bbdf12c04c1c9de0b6bb3019cb149d884364102d72052785fd042b143c98313e19c9c484ab1173738f439c56ab

        • C:\Users\Admin\AppData\Roaming\mnvcbn .exe
          Filesize

          1.1MB

          MD5

          b80414e3202a808673a8254aec607a12

          SHA1

          fef5c52c3af36689f3c794ce586d83b0a458afa5

          SHA256

          5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b

          SHA512

          3e1a4e4918b2b64238403811348248ff5955793cf405087edaac332461c74ee3d26b21f814565d22ae4f30cc4436821ac7f9fcdc61cae38d1ce8adf3ff2609b3

        • C:\Users\Admin\AppData\Roaming\mnvcbn .exe
          Filesize

          1.1MB

          MD5

          b80414e3202a808673a8254aec607a12

          SHA1

          fef5c52c3af36689f3c794ce586d83b0a458afa5

          SHA256

          5c09c1cfdc80893c1a64a68ed969bd26c929c78fb125747ad01064c5b237ad7b

          SHA512

          3e1a4e4918b2b64238403811348248ff5955793cf405087edaac332461c74ee3d26b21f814565d22ae4f30cc4436821ac7f9fcdc61cae38d1ce8adf3ff2609b3

        • memory/260-139-0x0000000000000000-mapping.dmp
        • memory/536-138-0x0000000000000000-mapping.dmp
        • memory/804-133-0x00000000054B0000-0x0000000005A54000-memory.dmp
          Filesize

          5.6MB

        • memory/804-134-0x0000000004F00000-0x0000000004F92000-memory.dmp
          Filesize

          584KB

        • memory/804-135-0x0000000004FA0000-0x000000000503C000-memory.dmp
          Filesize

          624KB

        • memory/804-132-0x00000000007D0000-0x00000000008F0000-memory.dmp
          Filesize

          1.1MB

        • memory/804-136-0x0000000006380000-0x000000000638A000-memory.dmp
          Filesize

          40KB

        • memory/1104-155-0x0000000000000000-mapping.dmp
        • memory/1104-158-0x0000000000EA0000-0x0000000000EBA000-memory.dmp
          Filesize

          104KB

        • memory/1404-152-0x0000000000400000-0x000000000047F000-memory.dmp
          Filesize

          508KB

        • memory/1404-151-0x0000000000400000-0x000000000047F000-memory.dmp
          Filesize

          508KB

        • memory/1404-153-0x0000000000400000-0x000000000047F000-memory.dmp
          Filesize

          508KB

        • memory/1404-154-0x0000000000400000-0x000000000047F000-memory.dmp
          Filesize

          508KB

        • memory/1404-150-0x0000000000000000-mapping.dmp
        • memory/1404-165-0x0000000000400000-0x000000000047F000-memory.dmp
          Filesize

          508KB

        • memory/2340-149-0x0000000000000000-mapping.dmp
        • memory/2456-137-0x0000000000000000-mapping.dmp
        • memory/2932-141-0x0000000000000000-mapping.dmp
        • memory/3184-142-0x0000000000000000-mapping.dmp
        • memory/3208-147-0x0000000000000000-mapping.dmp
        • memory/4436-160-0x0000000000000000-mapping.dmp
        • memory/4524-148-0x0000000000000000-mapping.dmp
        • memory/4592-140-0x0000000000000000-mapping.dmp
        • memory/4632-146-0x00000000006A0000-0x00000000007C0000-memory.dmp
          Filesize

          1.1MB

        • memory/4632-143-0x0000000000000000-mapping.dmp