Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2023 14:53

General

  • Target

    Photo_Jessa_Rhodes.vbs

  • Size

    3.0MB

  • MD5

    ba053f0069a5e1f112bde79b8460c07d

  • SHA1

    6c928e440da5067ded65078ac1599f999f5576b7

  • SHA256

    e303ae23d963f2247b113f3a228b2b5421bd9dd563a286db2bd88c4e94d2b1e1

  • SHA512

    f83cfbd608936796b7cb4136ac49afbc3ab69b91ebdea3d60ac79a6372d6948fbe6a50c366ef7bf54a2e10850b8d62c37c281363084a36caf5f73673f6096ec6

  • SSDEEP

    12288:Y/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/F/E/9F/x/E/A/jjh:euTiVoAC3FxQTXPsw

Malware Config

Extracted

Family

remcos

Botnet

Popads1

C2

15.235.53.10:3005

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-TOMSMO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Registers COM server for autorun 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\syswow64\wscript.exe
      "C:\Windows\syswow64\wscript.exe" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:2800
      • C:\Windows\winhlp32.exe
        "C:\Windows\winhlp32.exe"
        3⤵
          PID:5072
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
          3⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Modifies registry class
          PID:2276
        • C:\Windows\winhlp32.exe
          "C:\Windows\winhlp32.exe"
          3⤵
            PID:828
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
            3⤵
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:4712
          • C:\Windows\winhlp32.exe
            "C:\Windows\winhlp32.exe"
            3⤵
              PID:4104

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          Filesize

          13KB

          MD5

          e0b8dfd17b8e7de760b273d18e58b142

          SHA1

          801509fb6783c9e57edc67a72dde3c62080ffbaf

          SHA256

          4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

          SHA512

          443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbs
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • memory/828-151-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/828-152-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/828-150-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/916-148-0x00000000058D0000-0x00000000058D1000-memory.dmp
          Filesize

          4KB

        • memory/916-154-0x00000000059B0000-0x00000000059B1000-memory.dmp
          Filesize

          4KB

        • memory/4104-158-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4104-156-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/4104-157-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-176-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-183-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-145-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-144-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-146-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-159-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-160-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-161-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-162-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-163-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-164-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-165-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-166-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-167-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-168-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-169-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-170-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-171-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-172-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-173-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-174-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-175-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-142-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-177-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-178-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-179-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-180-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-181-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-182-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-143-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-184-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-185-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-186-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-187-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-188-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-189-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-190-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-191-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-192-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-193-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-194-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-195-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-196-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-197-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-198-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-199-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-200-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-201-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-202-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-203-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-204-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-205-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-206-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-207-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-208-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-209-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-210-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-211-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB

        • memory/5072-212-0x0000000000400000-0x000000000047A000-memory.dmp
          Filesize

          488KB