Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2023 18:33

General

  • Target

    My2021-22-W2-1040-1099-R.PDF.vbs

  • Size

    2.0MB

  • MD5

    679125286a8552fc36b9cbb2fafae268

  • SHA1

    4b2e7be52f7219389b367df7feb608351adfb270

  • SHA256

    0bda29c1168f11ab1a4f920dfdbe41708ef9766aa498ec78a32bd03e58c8419a

  • SHA512

    18e6638993bb796776752fc558b04d662731f6d8594d186ce6af77451ab9b83cec815df323d122894c58b6a9721e173b6f11593ca0ea5f797153adf58bcdf6be

  • SSDEEP

    24576:+8o61WnM8/07gQVyPXo7lCI+aSf7Wf0us3AtxqPZyDy3vgJxhgW:eswPXoBAx+4ALfN

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

193.142.146.203:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-4SUXAY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\My2021-22-W2-1040-1099-R.PDF.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\DAVe.exe
      "C:\Users\Admin\AppData\Local\Temp\DAVe.exe"
      2⤵
      • Executes dropped EXE
      PID:4928
  • C:\Users\Admin\AppData\Roaming\63225c08\python.exe
    "C:\Users\Admin\AppData\Roaming\63225c08\python.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Drops file in Windows directory
        PID:1484
        • C:\Windows\SysWOW64\dxdiag.exe
          "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
          4⤵
          • Drops file in System32 directory
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1088

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DAVe.exe
    Filesize

    1.4MB

    MD5

    5c31d8633ec3bc687b839d5a6ed60302

    SHA1

    36f51595002d616ea3ef9b58fc73692a84e93cc3

    SHA256

    1c01002517d40ea72de95919ad0d77fc877004037ea5fefe4fb111205694290e

    SHA512

    5bcc4d4e70fd8a3db11a7f78d95c26755bb80f488d65faa56342f09f5e891572febc8ab58858aaf868c0f78b0de18cdb0371aef2244255e9ab90ee28fb841a66

  • C:\Users\Admin\AppData\Local\Temp\DAVe.exe
    Filesize

    1.4MB

    MD5

    5c31d8633ec3bc687b839d5a6ed60302

    SHA1

    36f51595002d616ea3ef9b58fc73692a84e93cc3

    SHA256

    1c01002517d40ea72de95919ad0d77fc877004037ea5fefe4fb111205694290e

    SHA512

    5bcc4d4e70fd8a3db11a7f78d95c26755bb80f488d65faa56342f09f5e891572febc8ab58858aaf868c0f78b0de18cdb0371aef2244255e9ab90ee28fb841a66

  • C:\Users\Admin\AppData\Local\Temp\DAVe.exe
    Filesize

    1.4MB

    MD5

    5c31d8633ec3bc687b839d5a6ed60302

    SHA1

    36f51595002d616ea3ef9b58fc73692a84e93cc3

    SHA256

    1c01002517d40ea72de95919ad0d77fc877004037ea5fefe4fb111205694290e

    SHA512

    5bcc4d4e70fd8a3db11a7f78d95c26755bb80f488d65faa56342f09f5e891572febc8ab58858aaf868c0f78b0de18cdb0371aef2244255e9ab90ee28fb841a66

  • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
    Filesize

    760B

    MD5

    9f08ae34aab587439c631320644e5bab

    SHA1

    48b20c20018e2e69c2fd4e739d39847eb0ecb5af

    SHA256

    bfa45d3e0ebc1f421888b24cbf6dd5f4f1643ac5b25d762a5d704e31b68b622a

    SHA512

    3402b92b1e075634ec43393bba1cbbd40ecd8ded446e0dd0802ccc1a146d9e6e8cac0108519c2e317b394155578585aeb0763f838b0393dd3376ca3579f9eaad

  • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
    Filesize

    82KB

    MD5

    857234ba1436a104ba330a8e357bd972

    SHA1

    7e9a516e0687578d6805e17fa684a72a90110431

    SHA256

    5cb3ab1117cb846f1bf9343354e402f66a9d2b3aae789a2bd2c12be1b115c866

    SHA512

    2da5453c45cdd5f72d7ee789634780cdf0e1e54557381be2687f9dac5927aa9c7247398e571e4ab4dcf5a58782c577e6e3817eb03e85332a85c03843c60047c9

  • C:\Users\Admin\AppData\Roaming\63225c08\Fruit.png
    Filesize

    641KB

    MD5

    818d33ca21173d2e46f1a0013479a0b4

    SHA1

    4ab446faabbc4b1e1a258c2c38a7f2684135285f

    SHA256

    538b2f29e4a6f4015584188515588a56bb538ab5201e22de4fc6dca394d65d55

    SHA512

    6cefd4f9b150682e13d623045fb68b6d89d05987ab274668885d855c0bd53268a575a0431b5c4cdbbdad8205c3b0a8da2596136c356ec9944fde4dd17a9bf385

  • C:\Users\Admin\AppData\Roaming\63225c08\VCRUNTIME140.dll
    Filesize

    81KB

    MD5

    55c8e69dab59e56951d31350d7a94011

    SHA1

    b6af2d245ae4d67c38eb1cd31e0c1cffb29b9b2c

    SHA256

    9d8d21022ff9d3f6b81a45209662a4f3481edc2befae0c73b83cf942eab8be25

    SHA512

    efb2ac1891724df16268480628eb230b6ee37ed47b56d2e02a260559865cdd48ee340ce445e58f625e0f4d6dbdc5bfb7ce2eeedf564b837cff255ef7d1dc58cd

  • C:\Users\Admin\AppData\Roaming\63225c08\idea.cfg
    Filesize

    1KB

    MD5

    a007c4f45adbd258797cb86568feeee9

    SHA1

    7227e0a27841e795d043155a86b31798b6ea463a

    SHA256

    b6b0cf04b0c17eeb394d03d64422de0ea14bc046c86cd881aba8c1187f388025

    SHA512

    6b7c46c6d839be276b7c6f49fdbb946f5b57a1896d583503be5850f50db315bd02d057613f8e7f5e2d1ae4dea777700fb996604c7b4e367cb293bc7695a5419c

  • C:\Users\Admin\AppData\Roaming\63225c08\idea.mp3
    Filesize

    36KB

    MD5

    0bd497e905a9ebd04eb0ec6adaf27a23

    SHA1

    3b116c5ad39439994245e1a0b64d1fe7ff156ab9

    SHA256

    0c8c431a1f589fdcf453c7afada63c2e2e2a887e49abdbb222983fa6044fdf66

    SHA512

    96b42ee35b122b06e03c484e30752987e70e914badf931f66a43cc8eb5c807835c09e2ae8164edc311f2985341acd601996e3d81e8f0a699272fda9a157028b4

  • C:\Users\Admin\AppData\Roaming\63225c08\python.exe
    Filesize

    93KB

    MD5

    1f6ce27a40898ef68562d9c5eab4d2ab

    SHA1

    639bc5f89e669eda21d7f537cb4caaa4218d037d

    SHA256

    ea80f95fb9accd5059c0734b1f4bcc56aa07fd939376d4a13b733252ac26338e

    SHA512

    d9eff898270da89b5f5368bed6b260f55a8adf7fa4f490d653df30e1047100ab75ac50a32ce92bd53f3a2cbdf0d7ce3f2ccc67c278d51b2ae11836eb55a4d9ca

  • C:\Users\Admin\AppData\Roaming\63225c08\python.exe
    Filesize

    93KB

    MD5

    1f6ce27a40898ef68562d9c5eab4d2ab

    SHA1

    639bc5f89e669eda21d7f537cb4caaa4218d037d

    SHA256

    ea80f95fb9accd5059c0734b1f4bcc56aa07fd939376d4a13b733252ac26338e

    SHA512

    d9eff898270da89b5f5368bed6b260f55a8adf7fa4f490d653df30e1047100ab75ac50a32ce92bd53f3a2cbdf0d7ce3f2ccc67c278d51b2ae11836eb55a4d9ca

  • C:\Users\Admin\AppData\Roaming\63225c08\python39.dll
    Filesize

    4.2MB

    MD5

    ccc097e6b96ee1312fd55df2f313b5cc

    SHA1

    5db6f085bf0929a19ff190058e709b0f331f34d8

    SHA256

    77f2b7cc4b94e68988cc9628e75b39e5108e5dc418dd6447acbfb867877aea57

    SHA512

    6113864246bb2f5a07fb73a58313f111356bac896bdafa530486045d92d2909bd21d5e14a7d02e7288a7309036ca7125300b381048e7302f7c9cf975c1cf2f7f

  • C:\Users\Admin\AppData\Roaming\63225c08\python39.dll
    Filesize

    4.2MB

    MD5

    ccc097e6b96ee1312fd55df2f313b5cc

    SHA1

    5db6f085bf0929a19ff190058e709b0f331f34d8

    SHA256

    77f2b7cc4b94e68988cc9628e75b39e5108e5dc418dd6447acbfb867877aea57

    SHA512

    6113864246bb2f5a07fb73a58313f111356bac896bdafa530486045d92d2909bd21d5e14a7d02e7288a7309036ca7125300b381048e7302f7c9cf975c1cf2f7f

  • C:\Users\Admin\AppData\Roaming\63225c08\vcruntime140.dll
    Filesize

    81KB

    MD5

    55c8e69dab59e56951d31350d7a94011

    SHA1

    b6af2d245ae4d67c38eb1cd31e0c1cffb29b9b2c

    SHA256

    9d8d21022ff9d3f6b81a45209662a4f3481edc2befae0c73b83cf942eab8be25

    SHA512

    efb2ac1891724df16268480628eb230b6ee37ed47b56d2e02a260559865cdd48ee340ce445e58f625e0f4d6dbdc5bfb7ce2eeedf564b837cff255ef7d1dc58cd

  • memory/1088-194-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-197-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-200-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-199-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-198-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-196-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-195-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-190-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-189-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1088-188-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
    Filesize

    4KB

  • memory/1308-165-0x00000000060B0000-0x000000000613F000-memory.dmp
    Filesize

    572KB

  • memory/1308-161-0x0000000000570000-0x0000000000572000-memory.dmp
    Filesize

    8KB

  • memory/1308-164-0x0000000000A00000-0x0000000000A08000-memory.dmp
    Filesize

    32KB

  • memory/1308-166-0x00007FF8F3CD0000-0x00007FF8F3EC5000-memory.dmp
    Filesize

    2.0MB

  • memory/1484-183-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-170-0x00007FF8F3CD0000-0x00007FF8F3EC5000-memory.dmp
    Filesize

    2.0MB

  • memory/1484-185-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-181-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-184-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-167-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-175-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-182-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-169-0x00000000004A0000-0x00000000004A9000-memory.dmp
    Filesize

    36KB

  • memory/1484-187-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-186-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-204-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-205-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB

  • memory/1484-206-0x0000000000420000-0x00000000004A0000-memory.dmp
    Filesize

    512KB