Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-03-2023 14:46

General

  • Target

    Photo_Jessa_Rhodes.vbs

  • Size

    3.0MB

  • MD5

    ba053f0069a5e1f112bde79b8460c07d

  • SHA1

    6c928e440da5067ded65078ac1599f999f5576b7

  • SHA256

    e303ae23d963f2247b113f3a228b2b5421bd9dd563a286db2bd88c4e94d2b1e1

  • SHA512

    f83cfbd608936796b7cb4136ac49afbc3ab69b91ebdea3d60ac79a6372d6948fbe6a50c366ef7bf54a2e10850b8d62c37c281363084a36caf5f73673f6096ec6

  • SSDEEP

    12288:Y/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/F/E/9F/x/E/A/jjh:euTiVoAC3FxQTXPsw

Malware Config

Extracted

Family

remcos

Botnet

Popads1

C2

15.235.53.10:3005

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-TOMSMO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Registers COM server for autorun 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\syswow64\wscript.exe
      "C:\Windows\syswow64\wscript.exe" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:3152
      • C:\Windows\winhlp32.exe
        "C:\Windows\winhlp32.exe"
        3⤵
          PID:4996
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
          3⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Modifies registry class
          PID:2056
        • C:\Windows\winhlp32.exe
          "C:\Windows\winhlp32.exe"
          3⤵
            PID:4136
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
            3⤵
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:3932
          • C:\Windows\winhlp32.exe
            "C:\Windows\winhlp32.exe"
            3⤵
              PID:3092

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbs
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • \Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • \Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • \Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • \Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • memory/2628-137-0x0000000008230000-0x0000000008231000-memory.dmp
          Filesize

          4KB

        • memory/2628-146-0x00000000083B0000-0x00000000083B1000-memory.dmp
          Filesize

          4KB

        • memory/3092-152-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/3092-154-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/3092-153-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4136-145-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4136-143-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4136-147-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-171-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-178-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-148-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-136-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-135-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-133-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-155-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-156-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-157-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-158-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-159-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-160-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-161-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-162-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-163-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-164-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-165-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-166-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-167-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-168-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-169-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-170-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-130-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-172-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-173-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-174-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-175-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-176-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-177-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-139-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-179-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-180-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-181-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-182-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-183-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-184-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-185-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-186-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-187-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-188-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-189-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-190-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-191-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-192-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-193-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-194-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-195-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-196-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-197-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-198-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-199-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-200-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-201-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-202-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-203-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-204-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-205-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4996-206-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB