Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 12:43

General

  • Target

    e5de959183fcaaae232f085620f0d5f1.exe

  • Size

    3.3MB

  • MD5

    e5de959183fcaaae232f085620f0d5f1

  • SHA1

    c15f44fea00604dee5b4d08c7ca4b8503e136645

  • SHA256

    c834570ccd6b2682beabbfc8d40e992d52f386aa4542edb5f171250d6f1cb549

  • SHA512

    1d0855acf81fd3c26c49938311f6b5e7f06d9f6660a576c23fff30a746fa64d80ae4b26095c81501258515f17165f64918f8d55ff97c7c6b73f098e85027e551

  • SSDEEP

    49152:KAhI+dJiV7xK1zhUkVosXUj2jP2zQLWWtKnC:KAhf3g

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

rem.unionbindinqcompany.it:3361

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-F4O94O

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 14 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe
    "C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /C schtasks /create /tn \iATCd /tr "C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn \iATCd /tr "C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f
        3⤵
        • Creates scheduled task(s)
        PID:892
    • C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe
      "C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1032
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:865285 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:804
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:537619 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1720
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:865316 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1192
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:865343 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2184
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:1455131 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2452
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:799810 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2636
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:1258557 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2884
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
          PID:1260
        • C:\Windows\SysWOW64\svchost.exe
          svchost.exe
          3⤵
            PID:740
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            3⤵
              PID:1076
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              3⤵
                PID:944
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                3⤵
                  PID:2140
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  3⤵
                    PID:2192
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    3⤵
                      PID:2396
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      3⤵
                        PID:2460
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        3⤵
                          PID:2596
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          3⤵
                            PID:2628
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            3⤵
                              PID:2836
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              3⤵
                                PID:2892

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scheduled Task

                          1
                          T1053

                          Persistence

                          Scheduled Task

                          1
                          T1053

                          Privilege Escalation

                          Scheduled Task

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe
                            Filesize

                            3.3MB

                            MD5

                            e5de959183fcaaae232f085620f0d5f1

                            SHA1

                            c15f44fea00604dee5b4d08c7ca4b8503e136645

                            SHA256

                            c834570ccd6b2682beabbfc8d40e992d52f386aa4542edb5f171250d6f1cb549

                            SHA512

                            1d0855acf81fd3c26c49938311f6b5e7f06d9f6660a576c23fff30a746fa64d80ae4b26095c81501258515f17165f64918f8d55ff97c7c6b73f098e85027e551

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TLJEHC2B.txt
                            Filesize

                            601B

                            MD5

                            ce151a8381cd0ce2e6509d2e3008d0ce

                            SHA1

                            05557a00963bd95fbe4fcd7ee80a2a3f8aa4e06f

                            SHA256

                            bf534e0b0ac7b2cd6237441daf696f381a62f616ee4c5ff06d9f0aedf185394b

                            SHA512

                            c94e140a74ee597f95379ea5e7154c1f9f83960d7b560451169d7d7c8ea8514fb2114943a09e74e0e9b663f4ebd317567b50dcccf2523c159f8b806910a0034b

                          • \Users\Admin\AppData\Local\Temp\e5de959183fcaaae232f085620f0d5f1.exe
                            Filesize

                            3.3MB

                            MD5

                            e5de959183fcaaae232f085620f0d5f1

                            SHA1

                            c15f44fea00604dee5b4d08c7ca4b8503e136645

                            SHA256

                            c834570ccd6b2682beabbfc8d40e992d52f386aa4542edb5f171250d6f1cb549

                            SHA512

                            1d0855acf81fd3c26c49938311f6b5e7f06d9f6660a576c23fff30a746fa64d80ae4b26095c81501258515f17165f64918f8d55ff97c7c6b73f098e85027e551

                          • memory/740-83-0x00000000004C1812-mapping.dmp
                          • memory/892-56-0x0000000000000000-mapping.dmp
                          • memory/944-88-0x0000000000771812-mapping.dmp
                          • memory/1076-86-0x00000000005D1812-mapping.dmp
                          • memory/1260-81-0x0000000000541812-mapping.dmp
                          • memory/1592-63-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-65-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-66-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-67-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-68-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-70-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-72-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-60-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-73-0x0000000000432C26-mapping.dmp
                          • memory/1592-76-0x0000000075FC1000-0x0000000075FC3000-memory.dmp
                            Filesize

                            8KB

                          • memory/1592-77-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-84-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-79-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1592-61-0x0000000000400000-0x000000000047F000-memory.dmp
                            Filesize

                            508KB

                          • memory/1652-54-0x0000000000E40000-0x0000000001196000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1652-58-0x0000000000940000-0x0000000000948000-memory.dmp
                            Filesize

                            32KB

                          • memory/1652-57-0x00000000004A0000-0x00000000004B2000-memory.dmp
                            Filesize

                            72KB

                          • memory/1692-78-0x0000000000561812-mapping.dmp
                          • memory/2004-55-0x0000000000000000-mapping.dmp
                          • memory/2140-90-0x0000000000551812-mapping.dmp
                          • memory/2192-92-0x0000000000641812-mapping.dmp
                          • memory/2396-94-0x0000000000491812-mapping.dmp
                          • memory/2460-97-0x0000000000591812-mapping.dmp
                          • memory/2596-99-0x0000000000651812-mapping.dmp
                          • memory/2628-101-0x00000000005C1812-mapping.dmp
                          • memory/2836-103-0x0000000000771812-mapping.dmp
                          • memory/2892-105-0x00000000004F1812-mapping.dmp