Analysis

  • max time kernel
    88s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-03-2023 09:06

General

  • Target

    NER.exe

  • Size

    1.3MB

  • MD5

    15932ff2fd4d25d706112766560db0be

  • SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

  • SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

  • SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • SSDEEP

    24576:sHF0bvDMniKoyitZ2OGBhm9et9pBtV7eSgO5v0jMYuyDwVEXjByQdURaA3T:qFKAnzoyI+h4ugW/YuyDSEzORfT

Malware Config

Extracted

Family

remcos

Botnet

Maly 2023-Host

C2

maly22333.ddnsking.com:3091

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    cos.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • mouse_option

    false

  • mutex

    Rmc-GY5GD6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    nsa

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NER.exe
    "C:\Users\Admin\AppData\Local\Temp\NER.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\NER.exe
      "C:\Users\Admin\AppData\Local\Temp\NER.exe"
      2⤵
        PID:768
      • C:\Users\Admin\AppData\Local\Temp\NER.exe
        "C:\Users\Admin\AppData\Local\Temp\NER.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:472
        • C:\Users\Admin\AppData\Roaming\cos.exe
          "C:\Users\Admin\AppData\Roaming\cos.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:948
          • C:\Users\Admin\AppData\Roaming\cos.exe
            "C:\Users\Admin\AppData\Roaming\cos.exe"
            4⤵
            • Executes dropped EXE
            PID:1044
          • C:\Users\Admin\AppData\Roaming\cos.exe
            "C:\Users\Admin\AppData\Roaming\cos.exe"
            4⤵
            • Executes dropped EXE
            PID:1724
          • C:\Users\Admin\AppData\Roaming\cos.exe
            "C:\Users\Admin\AppData\Roaming\cos.exe"
            4⤵
            • Executes dropped EXE
            PID:688
          • C:\Users\Admin\AppData\Roaming\cos.exe
            "C:\Users\Admin\AppData\Roaming\cos.exe"
            4⤵
            • Executes dropped EXE
            PID:1784
          • C:\Users\Admin\AppData\Roaming\cos.exe
            "C:\Users\Admin\AppData\Roaming\cos.exe"
            4⤵
            • Executes dropped EXE
            PID:604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • C:\Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • \Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • \Users\Admin\AppData\Roaming\cos.exe

      Filesize

      1.3MB

      MD5

      15932ff2fd4d25d706112766560db0be

      SHA1

      58f23f95ab0b98c90cc532479c584d3e920490b0

      SHA256

      9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

      SHA512

      cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

    • memory/472-60-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-64-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-66-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-67-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/472-69-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-71-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-61-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-80-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-63-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-62-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/472-65-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/948-85-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/948-83-0x0000000000340000-0x000000000048A000-memory.dmp

      Filesize

      1.3MB

    • memory/948-84-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/1348-54-0x0000000000030000-0x000000000017A000-memory.dmp

      Filesize

      1.3MB

    • memory/1348-59-0x00000000054B0000-0x0000000005530000-memory.dmp

      Filesize

      512KB

    • memory/1348-58-0x0000000008570000-0x0000000008664000-memory.dmp

      Filesize

      976KB

    • memory/1348-57-0x0000000004B20000-0x0000000004B60000-memory.dmp

      Filesize

      256KB

    • memory/1348-56-0x00000000004F0000-0x0000000000502000-memory.dmp

      Filesize

      72KB

    • memory/1348-55-0x0000000004B20000-0x0000000004B60000-memory.dmp

      Filesize

      256KB