Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2023 09:36

General

  • Target

    PS MARILN JACKET S.8 and Sticker Series.docx

  • Size

    10KB

  • MD5

    fae941100b007533cd7aead9a7155603

  • SHA1

    6a434f5d9519417dfb2b408d105a7b5a04a1e8fb

  • SHA256

    453e835fcebe5695f7d314712666c6541195decf8ebcb105448daab986b07370

  • SHA512

    2920036a5fcd378b85d654a4b0d968b22489d02ae8bde8bd7b2bdd089555325e00d3fa68f4fb8f7e2e554ef364d354a98a864044f24fada6eb8add3217932ff3

  • SSDEEP

    192:ScIMmtPYqPC7UpG/bkpbJNONtrdlJFtGxV3rY0u:SPXgqPCfIJNONtjJFtGxxrYv

Malware Config

Extracted

Family

remcos

Botnet

First God LOVE

C2

yousbresde.ddns.net:31895

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-J6TVLD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PS MARILN JACKET S.8 and Sticker Series.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:884
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:888
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\bcjsgnfiila"
            4⤵
              PID:1056
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\bcjsgnfiila"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1632
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\lwolhgpjwtsjlxv"
              4⤵
              • Accesses Microsoft Outlook accounts
              PID:1908
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /stext "C:\Users\Admin\AppData\Local\Temp\nyudzyadsbkwoekapp"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:736

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Exploitation for Client Execution

      1
      T1203

      Defense Evasion

      Scripting

      1
      T1064

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\remcos\logs.dat
        Filesize

        334B

        MD5

        d6eed6749456e8dcf313abacccb0cf81

        SHA1

        ffb3596c8dac962a589bcf578f53c921366bdc27

        SHA256

        a94845e6060b6ec42bffe02b68bc301828d3f7e04bd5f777c71dc9f90677e18b

        SHA512

        72e7d2bcfbc733a68407f1358b268d66f1bad09dd29c1eb1e17bbbb7de71f53688c157f5e595b079eb295e1f0be6fe92a43341a4f74f3f2e4c714efdaace19c6

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
        Filesize

        128KB

        MD5

        22d78cde03d49507a82c6cc88c0a4fa7

        SHA1

        a7a7d3dc9defa3740e4e5b17de3c7369b6bc26b6

        SHA256

        62d233424fe6c6ac12e04d26be587fcfb9624e9ce9f984fd96ca9a5dd9159577

        SHA512

        e7b1bc3ac947ab581d0d4ac49d5bdf4ac4fcc8b0212e267fc1c5fd3f4ff79b6f130b7058084f0b907f2b855824cb330877340e2089e556ac27793dd3abcff6cb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\##################################[1].doc
        Filesize

        25KB

        MD5

        b399ca1298c7cb77fe79901d11a28452

        SHA1

        caa0421f8c96b4349873c6f8c2e2f5045f7d06ad

        SHA256

        c3d93fd4a248da7dbf8400da8b0efbd6a2f2aa549cf829dae9902ca9d4fec240

        SHA512

        b028421cf297c88688ae2a055a6616cdfe930cd411ae56f4dd052193d988b52e7d36fd0a7e07e9b6bfd58ae630c70f8032fe66ce000d23bf756edc9b1dd0118c

      • C:\Users\Admin\AppData\Local\Temp\bcjsgnfiila
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\bcjsgnfiila
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\{10508961-EC7B-499A-AD2F-05E563B4AB7C}
        Filesize

        128KB

        MD5

        0bcaff1ed210b8ca698ccc5759853a06

        SHA1

        3535c6e775bbbbf3e4421488c11e205a9cf061bc

        SHA256

        b7b00e54447ecd3210b044bfaf0d2a7a902d8e9864ef9e044cc10d564fa10667

        SHA512

        df3aed030f1ab8a7b9faca2dc164670c0cc8066f21e030ea284ca7049dffe34b7fe623509a71ae08bf55805daaa03ca0f41f5ad8471e6aa8900aab523cdae969

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        67ff8a97898351ba50cc2e784fb245d7

        SHA1

        f420c10e30043ab7d8dd0078a98fbed97048af78

        SHA256

        2bc42baaed86d5f57ce93172dd0bd19a4b812e89758f7ad9b5fa3da9b3473fda

        SHA512

        5a861d38c07bc489e439d321b141ebdf1ac08c45523a6453c16fcf4639fc9c5bbc0c062cb045e76d9ef3ac713779775c52ca70cab80176339836f911feeabe20

      • C:\Users\Public\vbc.exe
        Filesize

        1.6MB

        MD5

        f563b8ee9029b3eaf400d499a6d4813f

        SHA1

        1257500f4237aa15b7df00a3afefdff9fd81f1a1

        SHA256

        cf71f23d26be575be83b1af3ab4d8a52c79625d4fdbbe06a0375d7d9a093ce2a

        SHA512

        ad02b9e6b3c854360106a2de1209a6bcfdfbe6376b43b40f06993354a1bae0ff164c27aca7267420c54f2613a8fd81dbacf26794d0011727704caf4ffdf387ae

      • C:\Users\Public\vbc.exe
        Filesize

        1.6MB

        MD5

        f563b8ee9029b3eaf400d499a6d4813f

        SHA1

        1257500f4237aa15b7df00a3afefdff9fd81f1a1

        SHA256

        cf71f23d26be575be83b1af3ab4d8a52c79625d4fdbbe06a0375d7d9a093ce2a

        SHA512

        ad02b9e6b3c854360106a2de1209a6bcfdfbe6376b43b40f06993354a1bae0ff164c27aca7267420c54f2613a8fd81dbacf26794d0011727704caf4ffdf387ae

      • C:\Users\Public\vbc.exe
        Filesize

        1.6MB

        MD5

        f563b8ee9029b3eaf400d499a6d4813f

        SHA1

        1257500f4237aa15b7df00a3afefdff9fd81f1a1

        SHA256

        cf71f23d26be575be83b1af3ab4d8a52c79625d4fdbbe06a0375d7d9a093ce2a

        SHA512

        ad02b9e6b3c854360106a2de1209a6bcfdfbe6376b43b40f06993354a1bae0ff164c27aca7267420c54f2613a8fd81dbacf26794d0011727704caf4ffdf387ae

      • \Users\Public\vbc.exe
        Filesize

        1.6MB

        MD5

        f563b8ee9029b3eaf400d499a6d4813f

        SHA1

        1257500f4237aa15b7df00a3afefdff9fd81f1a1

        SHA256

        cf71f23d26be575be83b1af3ab4d8a52c79625d4fdbbe06a0375d7d9a093ce2a

        SHA512

        ad02b9e6b3c854360106a2de1209a6bcfdfbe6376b43b40f06993354a1bae0ff164c27aca7267420c54f2613a8fd81dbacf26794d0011727704caf4ffdf387ae

      • memory/736-198-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/736-202-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/736-201-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/736-200-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/888-158-0x0000000002570000-0x00000000025B0000-memory.dmp
        Filesize

        256KB

      • memory/888-159-0x0000000002570000-0x00000000025B0000-memory.dmp
        Filesize

        256KB

      • memory/888-157-0x0000000002570000-0x00000000025B0000-memory.dmp
        Filesize

        256KB

      • memory/888-150-0x0000000002570000-0x00000000025B0000-memory.dmp
        Filesize

        256KB

      • memory/888-151-0x0000000002570000-0x00000000025B0000-memory.dmp
        Filesize

        256KB

      • memory/928-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/928-252-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1276-156-0x0000000004980000-0x00000000049C0000-memory.dmp
        Filesize

        256KB

      • memory/1276-141-0x0000000000D90000-0x0000000000F2A000-memory.dmp
        Filesize

        1.6MB

      • memory/1276-143-0x0000000004AD0000-0x0000000004BF6000-memory.dmp
        Filesize

        1.1MB

      • memory/1276-144-0x0000000000690000-0x00000000006D8000-memory.dmp
        Filesize

        288KB

      • memory/1276-145-0x0000000004ED0000-0x0000000004F62000-memory.dmp
        Filesize

        584KB

      • memory/1276-146-0x0000000004980000-0x00000000049C0000-memory.dmp
        Filesize

        256KB

      • memory/1608-213-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/1608-171-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-174-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-176-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-177-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-178-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-179-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-180-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-181-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-182-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-183-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-185-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-258-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-257-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-162-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-163-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-224-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-223-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-164-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-173-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-170-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/1608-169-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-168-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-220-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-167-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-218-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/1608-166-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-217-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-165-0x0000000000400000-0x0000000000480000-memory.dmp
        Filesize

        512KB

      • memory/1608-216-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/1632-209-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1632-193-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1632-196-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1632-191-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1632-187-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/1908-212-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/1908-207-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/1908-195-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/1908-197-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB

      • memory/1908-190-0x0000000000400000-0x0000000000457000-memory.dmp
        Filesize

        348KB