Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 19:30

General

  • Target

    IUVR-8403-8402-2023._patched.exe

  • Size

    1.2MB

  • MD5

    898190d53ed165a6f08d0b2e1af9bfe0

  • SHA1

    cce3350bd6479aad0a4533401d875ec047c5f5d8

  • SHA256

    8bbc5bd45c06cfb409bea5431cb5e876633cd2b30730f6d2ccd0b5cb36616826

  • SHA512

    f88e1ebd8e35945653824ace11d5ab85e7c33b7db876bd0e0cd2925beece608e2033144dbad4a6a3fa5d58425c8bbb9da74af03ce7bd4608ab26b0d7c3a139f2

  • SSDEEP

    6144:AxjCbYJafbpsBSM/HVFku/7AGLr5lw2H3SgoXraFjvVpQ+QW8uR3OoJWwvTTZlIY:+PozpsBzkuHPgDsvELuv7ZlIgCjIDF

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

BILLETE

C2

cactus.con-ip.com:7770

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-9927QM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IUVR-8403-8402-2023._patched.exe
    "C:\Users\Admin\AppData\Local\Temp\IUVR-8403-8402-2023._patched.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
        3⤵
        • Creates scheduled task(s)
        PID:372
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\IUVR-8403-8402-2023._patched.exe" "C:\Users\Admin\AppData\Roaming\AppData.exe"
      2⤵
        PID:1228
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "'C:\Users\Admin\AppData\Local\Temp\IUVR-8403-8402-2023._patched.exe'"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4208
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
        2⤵
          PID:4536
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 512
            3⤵
            • Program crash
            PID:4452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4536 -ip 4536
        1⤵
          PID:3652
        • C:\Users\Admin\AppData\Roaming\AppData.exe
          C:\Users\Admin\AppData\Roaming\AppData.exe
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:364
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
              3⤵
              • Creates scheduled task(s)
              PID:3100
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c copy "C:\Users\Admin\AppData\Roaming\AppData.exe" "C:\Users\Admin\AppData\Roaming\AppData.exe"
            2⤵
              PID:1888
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "'C:\Users\Admin\AppData\Roaming\AppData.exe'"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1592
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              2⤵
              • Suspicious use of SetWindowsHookEx
              PID:1236
          • C:\Users\Admin\AppData\Roaming\AppData.exe
            C:\Users\Admin\AppData\Roaming\AppData.exe
            1⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1792
            • C:\Windows\SysWOW64\cmd.exe
              "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
              2⤵
                PID:1876
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\AppData.exe'" /f
                  3⤵
                  • Creates scheduled task(s)
                  PID:1260
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c copy "C:\Users\Admin\AppData\Roaming\AppData.exe" "C:\Users\Admin\AppData\Roaming\AppData.exe"
                2⤵
                  PID:1604
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "'C:\Users\Admin\AppData\Roaming\AppData.exe'"
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3820
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                  2⤵
                    PID:4424

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Discovery

                Query Registry

                1
                T1012

                System Information Discovery

                2
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\remcos\logs.dat
                  Filesize

                  144B

                  MD5

                  3d94f26347e9a0453ade35afc260c5ac

                  SHA1

                  14167935787aa6129ee917be8c77852a42f4c7ab

                  SHA256

                  55da8abebf714f3895276588a16d7f1434bd115cf368d2f7ffcff6b60e041e52

                  SHA512

                  591dad9bc2b32f69d5a52bf410e6d85793038910a601a57d8f7a55e438a47499514e126bce961cd21bc248f0b6d7832c680da180e048c31b6811266d65e20e9b

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppData.exe.log
                  Filesize

                  520B

                  MD5

                  03febbff58da1d3318c31657d89c8542

                  SHA1

                  c9e017bd9d0a4fe533795b227c855935d86c2092

                  SHA256

                  5164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4

                  SHA512

                  3750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                  Filesize

                  2KB

                  MD5

                  968cb9309758126772781b83adb8a28f

                  SHA1

                  8da30e71accf186b2ba11da1797cf67f8f78b47c

                  SHA256

                  92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                  SHA512

                  4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Filesize

                  16KB

                  MD5

                  276133c0fe5d0b34c255ff73e239c9f4

                  SHA1

                  7b7bc4c7cc5669a7838d9a7d437e025e3983265d

                  SHA256

                  8e6a57fa7a56eaf5557f087e4ec30048c734a59bcf561953d4432e9f43302a9f

                  SHA512

                  5c6bcc116c093415f61ecf722cc6edd1f3e874c4f64cc427f7a65a79f8d5593a6e3b7a1d3f0dcb718f7c5fbe47d143d1a42238681ece8dddb4cf6552b4f3dfd0

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Filesize

                  16KB

                  MD5

                  c072e6cebacd12046494e2e0a73810e5

                  SHA1

                  1f9e2423ce3e9403442a99f1b5c1695c4b3b7280

                  SHA256

                  65334fc327fd698a189a85be1e116fe530c4b4ad14eb30b56df59ebf70bef622

                  SHA512

                  69587722a6b2561db503332b8ce0088ec9a4a58b09f575eed42ce9569a2ef7ebf5ca181c52d92120796df09216a783c8c7ef358c17717710f87178d9fb571ce3

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_41uek0fg.cbh.ps1
                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Roaming\AppData.exe
                  Filesize

                  1.2MB

                  MD5

                  898190d53ed165a6f08d0b2e1af9bfe0

                  SHA1

                  cce3350bd6479aad0a4533401d875ec047c5f5d8

                  SHA256

                  8bbc5bd45c06cfb409bea5431cb5e876633cd2b30730f6d2ccd0b5cb36616826

                  SHA512

                  f88e1ebd8e35945653824ace11d5ab85e7c33b7db876bd0e0cd2925beece608e2033144dbad4a6a3fa5d58425c8bbb9da74af03ce7bd4608ab26b0d7c3a139f2

                • C:\Users\Admin\AppData\Roaming\AppData.exe
                  Filesize

                  1.2MB

                  MD5

                  898190d53ed165a6f08d0b2e1af9bfe0

                  SHA1

                  cce3350bd6479aad0a4533401d875ec047c5f5d8

                  SHA256

                  8bbc5bd45c06cfb409bea5431cb5e876633cd2b30730f6d2ccd0b5cb36616826

                  SHA512

                  f88e1ebd8e35945653824ace11d5ab85e7c33b7db876bd0e0cd2925beece608e2033144dbad4a6a3fa5d58425c8bbb9da74af03ce7bd4608ab26b0d7c3a139f2

                • C:\Users\Admin\AppData\Roaming\AppData.exe
                  Filesize

                  1.2MB

                  MD5

                  898190d53ed165a6f08d0b2e1af9bfe0

                  SHA1

                  cce3350bd6479aad0a4533401d875ec047c5f5d8

                  SHA256

                  8bbc5bd45c06cfb409bea5431cb5e876633cd2b30730f6d2ccd0b5cb36616826

                  SHA512

                  f88e1ebd8e35945653824ace11d5ab85e7c33b7db876bd0e0cd2925beece608e2033144dbad4a6a3fa5d58425c8bbb9da74af03ce7bd4608ab26b0d7c3a139f2

                • memory/376-191-0x00000000053C0000-0x00000000053D0000-memory.dmp
                  Filesize

                  64KB

                • memory/376-142-0x00000000053C0000-0x00000000053D0000-memory.dmp
                  Filesize

                  64KB

                • memory/376-134-0x0000000005980000-0x0000000005F24000-memory.dmp
                  Filesize

                  5.6MB

                • memory/376-133-0x00000000008F0000-0x0000000000A22000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1236-238-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-248-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-288-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-287-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-217-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-205-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-204-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-218-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-201-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-195-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-247-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-239-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-236-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-200-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-198-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-197-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1236-219-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/1592-233-0x000000007F1D0000-0x000000007F1E0000-memory.dmp
                  Filesize

                  64KB

                • memory/1592-222-0x0000000004D10000-0x0000000004D20000-memory.dmp
                  Filesize

                  64KB

                • memory/1592-223-0x0000000071650000-0x000000007169C000-memory.dmp
                  Filesize

                  304KB

                • memory/1592-216-0x0000000004D10000-0x0000000004D20000-memory.dmp
                  Filesize

                  64KB

                • memory/1592-203-0x0000000004D10000-0x0000000004D20000-memory.dmp
                  Filesize

                  64KB

                • memory/3820-267-0x0000000004E90000-0x0000000004EA0000-memory.dmp
                  Filesize

                  64KB

                • memory/3820-268-0x0000000004E90000-0x0000000004EA0000-memory.dmp
                  Filesize

                  64KB

                • memory/3820-270-0x0000000004E90000-0x0000000004EA0000-memory.dmp
                  Filesize

                  64KB

                • memory/3820-271-0x000000007F4C0000-0x000000007F4D0000-memory.dmp
                  Filesize

                  64KB

                • memory/3820-272-0x0000000073AE0000-0x0000000073B2C000-memory.dmp
                  Filesize

                  304KB

                • memory/4208-166-0x0000000005310000-0x0000000005320000-memory.dmp
                  Filesize

                  64KB

                • memory/4208-144-0x0000000005310000-0x0000000005320000-memory.dmp
                  Filesize

                  64KB

                • memory/4208-154-0x0000000005830000-0x0000000005852000-memory.dmp
                  Filesize

                  136KB

                • memory/4208-155-0x0000000006130000-0x0000000006196000-memory.dmp
                  Filesize

                  408KB

                • memory/4208-158-0x00000000061A0000-0x0000000006206000-memory.dmp
                  Filesize

                  408KB

                • memory/4208-167-0x00000000067E0000-0x00000000067FE000-memory.dmp
                  Filesize

                  120KB

                • memory/4208-188-0x0000000007E10000-0x0000000007E18000-memory.dmp
                  Filesize

                  32KB

                • memory/4208-187-0x0000000007E20000-0x0000000007E3A000-memory.dmp
                  Filesize

                  104KB

                • memory/4208-168-0x0000000005310000-0x0000000005320000-memory.dmp
                  Filesize

                  64KB

                • memory/4208-186-0x0000000007D20000-0x0000000007D2E000-memory.dmp
                  Filesize

                  56KB

                • memory/4208-145-0x0000000005950000-0x0000000005F78000-memory.dmp
                  Filesize

                  6.2MB

                • memory/4208-185-0x0000000007D60000-0x0000000007DF6000-memory.dmp
                  Filesize

                  600KB

                • memory/4208-184-0x0000000007B70000-0x0000000007B7A000-memory.dmp
                  Filesize

                  40KB

                • memory/4208-169-0x0000000006DB0000-0x0000000006DE2000-memory.dmp
                  Filesize

                  200KB

                • memory/4208-140-0x0000000005240000-0x0000000005276000-memory.dmp
                  Filesize

                  216KB

                • memory/4208-170-0x0000000070800000-0x000000007084C000-memory.dmp
                  Filesize

                  304KB

                • memory/4208-180-0x0000000006D70000-0x0000000006D8E000-memory.dmp
                  Filesize

                  120KB

                • memory/4208-181-0x00000000081A0000-0x000000000881A000-memory.dmp
                  Filesize

                  6.5MB

                • memory/4208-182-0x0000000007830000-0x000000000784A000-memory.dmp
                  Filesize

                  104KB

                • memory/4208-183-0x000000007F3A0000-0x000000007F3B0000-memory.dmp
                  Filesize

                  64KB

                • memory/4424-256-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/4424-255-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/4424-254-0x0000000000400000-0x0000000000480000-memory.dmp
                  Filesize

                  512KB

                • memory/4536-139-0x00000000008C0000-0x0000000000940000-memory.dmp
                  Filesize

                  512KB

                • memory/4536-153-0x00000000008C0000-0x0000000000940000-memory.dmp
                  Filesize

                  512KB

                • memory/4536-148-0x00000000008C0000-0x0000000000940000-memory.dmp
                  Filesize

                  512KB