Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 05:25

General

  • Target

    56a8aeac60e96feb740c5b5e1e5d08a33f340094fe2db71af960d4921158b325.exe

  • Size

    1.7MB

  • MD5

    f83cb2f595ba590173ecc32fe1a4f957

  • SHA1

    8f70abe57d708789e9c56ad98386c40253224758

  • SHA256

    56a8aeac60e96feb740c5b5e1e5d08a33f340094fe2db71af960d4921158b325

  • SHA512

    ac095b7d37ede5b2d4c31fe2f6a0317726d5a95d90aaba1fa8bb642e608f6c3cb6b2438140729e8d1b56ae8ff3b364db41d0fd12cb19acac267d857edf7c3d6b

  • SSDEEP

    24576:rAOcZGRcaQLzZAZ5WCGXZ2El/5DVvnrjsNNIJhYPZwyI3Tr+Mo5pemHI0YuyqI8u:tBQvZAZ4zJXvMNN8YBdcxo5EmHWqI8u

Malware Config

Extracted

Family

remcos

Botnet

EXPLORER WDs

C2

198.23.207.34:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-563ZPZ

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    PingPongWD

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 1 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 7 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 7 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56a8aeac60e96feb740c5b5e1e5d08a33f340094fe2db71af960d4921158b325.exe
    "C:\Users\Admin\AppData\Local\Temp\56a8aeac60e96feb740c5b5e1e5d08a33f340094fe2db71af960d4921158b325.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\temp\9_55\Dropperremvom.exe
      "C:\Users\Admin\AppData\Local\temp\9_55\Dropperremvom.exe" Community portal – Bulletin board,
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe
        "C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe" 0
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Windows\SysWOW64\cmd.exe
          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • UAC bypass
            • Modifies registry key
            PID:3300
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rfil.js" 0
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:1932
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\9_55\sghmip.vbe"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe
        "C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe" agrdptjrl.tbq
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe"
          4⤵
            PID:320
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe"
            4⤵
              PID:116
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\SysWOW64\mshta.exe"
              4⤵
                PID:1488
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe"
                4⤵
                  PID:3636
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\SysWOW64\mshta.exe"
                  4⤵
                    PID:4624
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe"
                    4⤵
                      PID:1000
                    • C:\Windows\SysWOW64\mshta.exe
                      "C:\Windows\SysWOW64\mshta.exe"
                      4⤵
                        PID:864
                      • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
                        "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:1780
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9_55\run.vbs"
                        4⤵
                        • Checks computer location settings
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2304
                        • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe
                          "C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe" AGRDPT~1.TBQ
                          5⤵
                          • Executes dropped EXE
                          • Checks computer location settings
                          • Drops startup file
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:3520
                          • C:\Windows\SysWOW64\mshta.exe
                            "C:\Windows\SysWOW64\mshta.exe"
                            6⤵
                              PID:4740
                            • C:\Windows\SysWOW64\mshta.exe
                              "C:\Windows\SysWOW64\mshta.exe"
                              6⤵
                                PID:3940
                              • C:\Windows\SysWOW64\mshta.exe
                                "C:\Windows\SysWOW64\mshta.exe"
                                6⤵
                                  PID:4668
                                • C:\Windows\SysWOW64\mshta.exe
                                  "C:\Windows\SysWOW64\mshta.exe"
                                  6⤵
                                    PID:4756
                                  • C:\Windows\SysWOW64\mshta.exe
                                    "C:\Windows\SysWOW64\mshta.exe"
                                    6⤵
                                      PID:2204
                                    • C:\Windows\SysWOW64\mshta.exe
                                      "C:\Windows\SysWOW64\mshta.exe"
                                      6⤵
                                        PID:4792
                                      • C:\Windows\SysWOW64\mshta.exe
                                        "C:\Windows\SysWOW64\mshta.exe"
                                        6⤵
                                          PID:1672
                                        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
                                          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          PID:4892
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9_55\run.vbs"
                                          6⤵
                                          • Checks computer location settings
                                          • Modifies registry class
                                          PID:1076
                                          • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe
                                            "C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe" AGRDPT~1.TBQ
                                            7⤵
                                            • Executes dropped EXE
                                            PID:3220

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe

                                Filesize

                                469KB

                                MD5

                                a1a3a833a1b5ee29692fac886b8c1922

                                SHA1

                                6c82c2d7ac2c340e184ac96bb3c115e72310fe93

                                SHA256

                                9fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4

                                SHA512

                                27088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090

                              • C:\Users\Admin\AppData\Local\Temp\68.144.191remcos_nostartdisabler.exe

                                Filesize

                                469KB

                                MD5

                                a1a3a833a1b5ee29692fac886b8c1922

                                SHA1

                                6c82c2d7ac2c340e184ac96bb3c115e72310fe93

                                SHA256

                                9fc4dac32d7eb7e825f6c576df81ed33a00f7306c7d8d834f37a53415217a9a4

                                SHA512

                                27088f44ebb72cfbe9bd67209d0a947881c179f9c711beafa1259a92da0c5bcfd5112a5970ab2b96158290561c30ed0137eb73d8f7e6e107d0bfac31515cc090

                              • C:\Users\Admin\AppData\Local\Temp\9_55\Dropperremvom.exe

                                Filesize

                                484KB

                                MD5

                                a4c95311e65e2dea102ab354fd2ce363

                                SHA1

                                dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                                SHA256

                                40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                                SHA512

                                927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                              • C:\Users\Admin\AppData\Local\Temp\9_55\agrdptjrl.tbq

                                Filesize

                                225.5MB

                                MD5

                                ea90082dc987236f1c70de218110bc88

                                SHA1

                                a5ed72a722bead89179b565f3bb10d8056934123

                                SHA256

                                370c1060f5c918e2451dbbca652a11b38a6cd8c2335819a5349b8b61019584cf

                                SHA512

                                d6b3b22cd3a5d5a8937a318e8d9865a8828af0bac8ae1e98936d15b0e4c8263deb9971fb8d128e9dbab703a4898a2c6d26f0a255a6bdc754d66fd25b78d002f5

                              • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe

                                Filesize

                                1.0MB

                                MD5

                                b153044cf36a027e19eb94b06003f09c

                                SHA1

                                9c5137654c78d249b318d7612a4d3dd2710c3aea

                                SHA256

                                cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                                SHA512

                                ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                              • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe

                                Filesize

                                1.0MB

                                MD5

                                b153044cf36a027e19eb94b06003f09c

                                SHA1

                                9c5137654c78d249b318d7612a4d3dd2710c3aea

                                SHA256

                                cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                                SHA512

                                ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                              • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe

                                Filesize

                                1.0MB

                                MD5

                                b153044cf36a027e19eb94b06003f09c

                                SHA1

                                9c5137654c78d249b318d7612a4d3dd2710c3aea

                                SHA256

                                cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                                SHA512

                                ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                              • C:\Users\Admin\AppData\Local\Temp\9_55\nqqjm.exe

                                Filesize

                                1.0MB

                                MD5

                                b153044cf36a027e19eb94b06003f09c

                                SHA1

                                9c5137654c78d249b318d7612a4d3dd2710c3aea

                                SHA256

                                cbcdc1eecb091c7e3418706dd0aafaca9018474150f73d2d4b1cc55595dcf550

                                SHA512

                                ef301b7c23b5012909e6b2a48d7bffbfc122e6c18180b66bd7ac16c8e9a27f3eff6b7cbab8a997857e6d101f8275ca87ba30d153fecb62e630aad14d923d7b96

                              • C:\Users\Admin\AppData\Local\Temp\9_55\pphp.ppt

                                Filesize

                                65KB

                                MD5

                                10708daa56a5b39039cb271198be1b38

                                SHA1

                                4176703c914e753b2461fce2855c8ba2a15a4db1

                                SHA256

                                260118c61eacdb255dc945071dddb72595116254de4a38d9ea6f0c893a5c41b7

                                SHA512

                                f62f2515a63761afb93d67b29a0c126e4e723a772624ef6f2323350d4893f4776c8965f4ca6671140cb6d5395b6848fd6f245bb574e1816166706b4d612aec7a

                              • C:\Users\Admin\AppData\Local\Temp\9_55\run.vbs

                                Filesize

                                129B

                                MD5

                                cd8fffdcb405fefd12c6dfd9170ae80a

                                SHA1

                                8bfa32588d88bb900da5cad769734362c98f3221

                                SHA256

                                864176006b5254ef4c10914e054dcad2f4eac2c2f80d229ea7a83a084f72b64e

                                SHA512

                                d87603d7fc52867aedf8703f195a632152c1f04a3e6250bb954897b25a8a07ed0d887cbba71afd8226d0f8a82a6ff241028a09d3a10a447fd3d04351850b2839

                              • C:\Users\Admin\AppData\Local\Temp\9_55\sstnaean.nga

                                Filesize

                                939KB

                                MD5

                                7c6504d4093282be6deb049fb90e7987

                                SHA1

                                c041f1813dd23c9345def31e25e97d7b70c39f99

                                SHA256

                                00c771a95723e1052bcf23dc0f6cab5497385fd7a20ad422c2c47331bdb63ad3

                                SHA512

                                36afa7a7b78967e250b33417dd763a361cba552d28279e2d50d4dbd4c579a20d961966bc401f422c063a314e8c5734cb4bdbc837d4052b4a13d2dda22ab90341

                              • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

                                Filesize

                                44KB

                                MD5

                                9d352bc46709f0cb5ec974633a0c3c94

                                SHA1

                                1969771b2f022f9a86d77ac4d4d239becdf08d07

                                SHA256

                                2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

                                SHA512

                                13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

                              • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

                                Filesize

                                44KB

                                MD5

                                9d352bc46709f0cb5ec974633a0c3c94

                                SHA1

                                1969771b2f022f9a86d77ac4d4d239becdf08d07

                                SHA256

                                2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

                                SHA512

                                13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

                              • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

                                Filesize

                                44KB

                                MD5

                                9d352bc46709f0cb5ec974633a0c3c94

                                SHA1

                                1969771b2f022f9a86d77ac4d4d239becdf08d07

                                SHA256

                                2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

                                SHA512

                                13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

                              • C:\Users\Admin\AppData\Local\Temp\rfil.js

                                Filesize

                                3KB

                                MD5

                                6c705c7ee0ce269b3e6eb770b797e808

                                SHA1

                                e8c6540e4dbb6a464e1f0c2c59cab161f44a8705

                                SHA256

                                dbd1b9421d8634cc2af6ae9c4fe72891bd3139527730185d2e28afe0447b4e2e

                                SHA512

                                0999401d3218986eac63b8e449a572cdd5aec382fac11a6aa86b6a4035107b75343f6f005d506322c0a0e853c7566cf49078991d93cadfab1e80fad8ed1d93e2

                              • C:\Users\Admin\AppData\Local\temp\9_55\Dropperremvom.exe

                                Filesize

                                484KB

                                MD5

                                a4c95311e65e2dea102ab354fd2ce363

                                SHA1

                                dd6ff55b42fadd8dc8cf08ea7590341120f3b12d

                                SHA256

                                40088dd01a057e06e97f899ebb62ee669c1d72ca5667c01faea915d705bcddab

                                SHA512

                                927f187362c792b1d1ccc87eb0716bee7b73f12e293eeabd6edf691e6579efe0c9cbd39e1c8316683cf146cdfc74937c1639487b1653ccc9008f79ce4fb581f6

                              • C:\Users\Admin\AppData\Local\temp\9_55\sghmip.vbe

                                Filesize

                                29KB

                                MD5

                                0ad020f2a61c856e19e2aaaee830c8ed

                                SHA1

                                743adeb2eaa7d9e692cbab5c854bf2f86bf7b6e5

                                SHA256

                                f2329e7baaa52c0b128b74ad17dfd14d0c09be1f14b0ab282b6aef4f09efd545

                                SHA512

                                0d08294c9a401881cda10231e02fb637c8f20bb7b9db18bbcc4c8558423bffe372f9890e9053bcf3a1480b422bfe15cf3ad4b20dfb0f133a8cebf1a1253b4f5b

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start.lnk

                                Filesize

                                455B

                                MD5

                                41eafb20ab7736735634e9d8aa669cbf

                                SHA1

                                12d3599542407fd34aac0cb6a1833f267c8d5d5b

                                SHA256

                                49ac1c849d9e2630d6f16310a5122075626f1124ca4a664e62e9eb9b2524768e

                                SHA512

                                5dadadf85fe439411dd7fd28f24ac237668df87ff1906d4d7aa460ec402844469ed70fe5935c1e352eb67d7915759631229ac1b855b89a903206b37465fa260e

                              • memory/1780-159-0x0000000000900000-0x0000000000DFC000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/1780-162-0x0000000000900000-0x0000000000DFC000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/1780-163-0x0000000000900000-0x0000000000DFC000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/1780-164-0x0000000000900000-0x0000000000DFC000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/4892-177-0x0000000001140000-0x00000000017BF000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/4892-180-0x0000000001140000-0x00000000017BF000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/4892-181-0x0000000001140000-0x00000000017BF000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/4892-182-0x0000000001140000-0x00000000017BF000-memory.dmp

                                Filesize

                                6.5MB