Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2023 05:57

General

  • Target

    swift103.exe

  • Size

    1.1MB

  • MD5

    8983a4b99c0e4d0f73ff5d266dd67530

  • SHA1

    aeea9b73d6e3da69bc813f8631da539bb68e5a45

  • SHA256

    4d8f8def81704bbd8e31779ecb3b8d25f0d8bc0d2a3dbd55c1f18217dd1ecf5f

  • SHA512

    3d9dc1abf87ccb3ec3d686fb412af94230820bd550abd3fd16aeedc09cb255342904ee82d67e639056d31522d778db4bb0c7abc2978e808a7d4904fbe9168366

  • SSDEEP

    12288:NtN+qFRD49GYo3EU9Aj4aNJqASiMOUS+6IjfG80A5ZXYsLgzCROfekqQz/sYgVgw:NLX89GZ9Na2lO0Zf1/VgOk1zkfVc1M

Malware Config

Extracted

Family

remcos

Botnet

APRIL

C2

mrbigice.hopto.org:3453

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-N5A2Q9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    toolz

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\swift103.exe
    "C:\Users\Admin\AppData\Local\Temp\swift103.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\wscript.exe
      C:\Windows\System32\wscript.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 376
        3⤵
        • Program crash
        PID:796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1512-61-0x0000000001CB0000-0x0000000001CB1000-memory.dmp

    Filesize

    4KB

  • memory/1512-64-0x0000000001D10000-0x0000000001D11000-memory.dmp

    Filesize

    4KB

  • memory/1512-69-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB

  • memory/1512-78-0x0000000010590000-0x000000001060F000-memory.dmp

    Filesize

    508KB

  • memory/1512-81-0x0000000001DC0000-0x0000000001DC1000-memory.dmp

    Filesize

    4KB

  • memory/1512-83-0x0000000010590000-0x000000001060F000-memory.dmp

    Filesize

    508KB

  • memory/1512-84-0x0000000002030000-0x00000000020AC000-memory.dmp

    Filesize

    496KB

  • memory/1560-54-0x0000000002240000-0x00000000022DF000-memory.dmp

    Filesize

    636KB

  • memory/1560-56-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1560-57-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/1560-60-0x0000000010590000-0x000000001060F000-memory.dmp

    Filesize

    508KB

  • memory/1560-77-0x0000000010590000-0x000000001060F000-memory.dmp

    Filesize

    508KB