Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 17:01

General

  • Target

    tmp.exe

  • Size

    1.3MB

  • MD5

    90eb893c66efe4e796330b770c4d8d93

  • SHA1

    8922081a55722db249b05f132e1040d3c50d1354

  • SHA256

    7255c52bd792b4078fb2bc5924259cc3becada28ea69afb76f26a7b2eb2f28cd

  • SHA512

    0cda9bb881c11c8ba3e606c2598e85d217411db3dfdf35b37225bc3db5683c1805743d364a07b92ceded0877efc2ef5aa4d4ef35aeb6711b17af397bac08e1e6

  • SSDEEP

    24576:9TbBv5rUeTwPmcZScRR2O0nCmLNLIgiB5TGrC003Svlxi6K7nY:XBvws551xLIhzH3Svfi6KE

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

185.246.220.63:3689

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-7SGYUR

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\temp\Folder5_51\doc13496420221216084118.one"
      2⤵
      • Drops startup file
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE
        /tsr
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1620
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\System32\wscript.exe" hije-videm.jpg.vbe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\Folder5_51\budqfkigs.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder5_51\budqfkigs.exe" bmbkimik.icm
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1704
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1104
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:832
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:316

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    03171ff1326f9efd6ebafd3b747d1e25

    SHA1

    cbfbe885b90f0bf7d490cd9fdebb1d8f9e120d49

    SHA256

    5f91468064da63016fb3e3f46eb1500b7035e1dd0da7771e2d75dda6ce97dacc

    SHA512

    ccd92809fe77f0f19895851204eb0b92f454b82e890a5de716e89941a14354f8bdd714f9d528827a1f0c7e1d02d522393553139f3be5e4f941c9777ccd9d1df8

  • C:\Users\Admin\AppData\Local\Temp\FOLDER~1\XTOQLX~1.LKG
    Filesize

    868KB

    MD5

    35bc444640fc20fdc0684e881138893a

    SHA1

    68d4849f4ce3eb8f3f65a4e153ed8857e7e0df86

    SHA256

    34e8c732c5234e879eac49f04157b3481ca78a254a1684e5dbff03d50335e400

    SHA512

    0d1d31fed1c984a7296c64f07da6289af5c97a4c4c160b1d5e3ca2485fa0fe38f1a4df3a93cf91333eba9ffcaec2c07b92bd8332cf18f2f3b40a7b9b53900bd6

  • C:\Users\Admin\AppData\Local\Temp\FOLDER~1\tbgi.xml
    Filesize

    35KB

    MD5

    cc7e2e9d417bdaee212f6e989d1d172a

    SHA1

    a4e153ca711e875c1fa77eee6d4343018ad7ae52

    SHA256

    27efbbb8e5c10158fed09405ac7d4216f64dd8070e81e247a222f8581d47c791

    SHA512

    73361d1dfc4b2c8b781e21b6b5563e60c126c0ab27cfef5b4fa6dda431870cb07cbb131d21b45a453fae4e030c6b824a88ecc95b52cb66c102fb0c00304840e9

  • C:\Users\Admin\AppData\Local\Temp\Folder5_51\bmbkimik.icm
    Filesize

    122.5MB

    MD5

    02c4d23c2333210fab8f0cbe3387c4d8

    SHA1

    77a51294f080dda7cb8c0fe48e31d1cbc5390fa2

    SHA256

    91e6df1f33831c38ad032c39b95dfbf07694cd1960e0aeb6737b4fff909965b7

    SHA512

    064a3e23935164f2bb49c5b2eb8501588838a2be0725760b28d0c96e3f955866a0631b49006aa466650195de4cf4b285ca415133d054e96f4539a551e821fb24

  • C:\Users\Admin\AppData\Local\Temp\Folder5_51\budqfkigs.exe
    Filesize

    1.3MB

    MD5

    af42c158ed705fb237cd7b7d9cbe11c6

    SHA1

    76be2a5f19857b4f5df22791c6f0921a1693477c

    SHA256

    0c31954b57eee24a82d2eabbf865aac29e96c455e70f923a821712a3f9107753

    SHA512

    9bc60f17a66a45470347ef219927c8973aed25e0d3f7cd3657743c9faa5961bd8ed818bf7c97d0c73b02e7bb5461eadd8a7bb1266ec5c28e3c36fc30a39e9686

  • C:\Users\Admin\AppData\Local\Temp\Folder5_51\budqfkigs.exe
    Filesize

    1.3MB

    MD5

    af42c158ed705fb237cd7b7d9cbe11c6

    SHA1

    76be2a5f19857b4f5df22791c6f0921a1693477c

    SHA256

    0c31954b57eee24a82d2eabbf865aac29e96c455e70f923a821712a3f9107753

    SHA512

    9bc60f17a66a45470347ef219927c8973aed25e0d3f7cd3657743c9faa5961bd8ed818bf7c97d0c73b02e7bb5461eadd8a7bb1266ec5c28e3c36fc30a39e9686

  • C:\Users\Admin\AppData\Local\Temp\Folder5_51\doc13496420221216084118.one
    Filesize

    125KB

    MD5

    87cb81babc0fffdf8e78f61f474cb7c1

    SHA1

    38d26c532637f6a8688ecc1fa981188e59b04222

    SHA256

    41bc4cc472e0cb141c9eec4f6921bd0e02fadf1d05ee01e02b41fee28442533f

    SHA512

    2e4f475ae5e8696bdf97a3e4a162b695c1dfa39dc10b6c7518f4e645a2a959a7eb3bd629523b66afa4553a0e33e63f6aa59cf55f43e070e77a3bc936b8b8ddf7

  • C:\Users\Admin\AppData\Local\temp\Folder5_51\hije-videm.jpg.vbe
    Filesize

    59KB

    MD5

    ea8b8ddf5aa440aa2739570924081c61

    SHA1

    80960cd9e27208747ad8fbe285cfd744d252827a

    SHA256

    2762e6ca8be6c23699a1d2555239f618075e326df1a1efa4b327085295c947f4

    SHA512

    57a0ee5eed53475b7934c49547ee4377148836ea3c6a444449006fe8dfb11f1162a407ed73b2df6a006311d3b1fbfe97b8ba25f2c67f61ffd3d74e86f05e8b77

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EU9WB2NQ.txt
    Filesize

    608B

    MD5

    5122a2dad4d8c4800a220630f03315a5

    SHA1

    46553560cdb64df2a82940f9f03cc6249dc99de9

    SHA256

    e7171d7a2971237eec032a867ab9741980d02a0415221da7f7c606faf17e6fea

    SHA512

    3e51911852351e9d9bcc27ac9edfdef95813953eae78a98a83d1cff12fbdcd5a2e2e1a2f6a6cac7ca8b90db5827f431cedf465cd87b4eab12d360c732b087856

  • \Users\Admin\AppData\Local\Temp\Folder5_51\budqfkigs.exe
    Filesize

    1.3MB

    MD5

    af42c158ed705fb237cd7b7d9cbe11c6

    SHA1

    76be2a5f19857b4f5df22791c6f0921a1693477c

    SHA256

    0c31954b57eee24a82d2eabbf865aac29e96c455e70f923a821712a3f9107753

    SHA512

    9bc60f17a66a45470347ef219927c8973aed25e0d3f7cd3657743c9faa5961bd8ed818bf7c97d0c73b02e7bb5461eadd8a7bb1266ec5c28e3c36fc30a39e9686

  • memory/568-57-0x0000000000000000-mapping.dmp
  • memory/824-64-0x0000000000000000-mapping.dmp
  • memory/900-56-0x0000000070A51000-0x0000000070A53000-memory.dmp
    Filesize

    8KB

  • memory/900-73-0x0000000071A3D000-0x0000000071A48000-memory.dmp
    Filesize

    44KB

  • memory/900-55-0x0000000000000000-mapping.dmp
  • memory/900-60-0x0000000071A3D000-0x0000000071A48000-memory.dmp
    Filesize

    44KB

  • memory/1104-81-0x00000000000C8356-mapping.dmp
  • memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmp
    Filesize

    8KB

  • memory/1620-70-0x0000000000000000-mapping.dmp
  • memory/1704-74-0x0000000000380000-0x0000000000A2C000-memory.dmp
    Filesize

    6.7MB

  • memory/1704-76-0x0000000000380000-0x0000000000A2C000-memory.dmp
    Filesize

    6.7MB

  • memory/1704-77-0x00000000003B2E48-mapping.dmp
  • memory/1704-80-0x0000000000380000-0x0000000000A2C000-memory.dmp
    Filesize

    6.7MB

  • memory/1704-82-0x0000000000380000-0x0000000000A2C000-memory.dmp
    Filesize

    6.7MB