Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 09:06

General

  • Target

    NER.exe

  • Size

    1.3MB

  • MD5

    15932ff2fd4d25d706112766560db0be

  • SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

  • SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

  • SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • SSDEEP

    24576:sHF0bvDMniKoyitZ2OGBhm9et9pBtV7eSgO5v0jMYuyDwVEXjByQdURaA3T:qFKAnzoyI+h4ugW/YuyDSEzORfT

Malware Config

Extracted

Family

remcos

Botnet

Maly 2023-Host

C2

maly22333.ddnsking.com:3091

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    cos.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • mouse_option

    false

  • mutex

    Rmc-GY5GD6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    nsa

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NER.exe
    "C:\Users\Admin\AppData\Local\Temp\NER.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\NER.exe
      "C:\Users\Admin\AppData\Local\Temp\NER.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Roaming\cos.exe
        "C:\Users\Admin\AppData\Roaming\cos.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Users\Admin\AppData\Roaming\cos.exe
          "C:\Users\Admin\AppData\Roaming\cos.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:2548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\cos.exe

    Filesize

    1.3MB

    MD5

    15932ff2fd4d25d706112766560db0be

    SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

    SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

    SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • C:\Users\Admin\AppData\Roaming\cos.exe

    Filesize

    1.3MB

    MD5

    15932ff2fd4d25d706112766560db0be

    SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

    SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

    SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • C:\Users\Admin\AppData\Roaming\cos.exe

    Filesize

    1.3MB

    MD5

    15932ff2fd4d25d706112766560db0be

    SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

    SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

    SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • C:\Users\Admin\AppData\Roaming\cos.exe

    Filesize

    1.3MB

    MD5

    15932ff2fd4d25d706112766560db0be

    SHA1

    58f23f95ab0b98c90cc532479c584d3e920490b0

    SHA256

    9d0382b562197eae6d94c939b20facd7614b097cb8ad53bf135818d6b854a785

    SHA512

    cc00da25f8b0980a5721b7d7b9c1cdfa7c203fe52a43587c3ff54e5d836fd54ec13a41aa28b4655724c56b8b20c60248ee96572a3a65c899256a7ff996942bdd

  • memory/2464-134-0x0000000005660000-0x0000000005C04000-memory.dmp

    Filesize

    5.6MB

  • memory/2464-135-0x0000000005190000-0x0000000005222000-memory.dmp

    Filesize

    584KB

  • memory/2464-136-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2464-137-0x0000000005180000-0x000000000518A000-memory.dmp

    Filesize

    40KB

  • memory/2464-138-0x0000000008060000-0x0000000008206000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-139-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2464-140-0x0000000006AC0000-0x0000000006B5C000-memory.dmp

    Filesize

    624KB

  • memory/2464-133-0x0000000000410000-0x000000000055A000-memory.dmp

    Filesize

    1.3MB

  • memory/2548-192-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-184-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-209-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-208-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-207-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-206-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-205-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-162-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-164-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-165-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-167-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-168-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-169-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-170-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-171-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-174-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-175-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-176-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-177-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-178-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-179-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-180-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-181-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-182-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-183-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-204-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-185-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-186-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-187-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-188-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-189-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-190-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-191-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-203-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-193-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-194-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-195-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-196-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-197-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-198-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-199-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-200-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-201-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2548-202-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3984-141-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3984-146-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3984-143-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3984-157-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3984-144-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4404-159-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB

  • memory/4404-158-0x00000000048C0000-0x00000000048D0000-memory.dmp

    Filesize

    64KB