Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2023 05:55

General

  • Target

    648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe

  • Size

    273KB

  • MD5

    9e925b69e3dbb48c606de897284d31ae

  • SHA1

    3ac4fba103c1e58bf0ab6086c3195a4ec99434e6

  • SHA256

    648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa

  • SHA512

    5d21d022b8c417f96da49abfa75e0514d45e99ac49956b1b05b73db35267dfeae0cc8beb7d6396fa3f42ed50bcebdc0bc62a39ea6edc1029cb5a3bc33693a61b

  • SSDEEP

    3072:NJQHFFX6f+uKVWyxLvZ2RFIEtg6o5dqGDQSQmYI6Lw3VfsB75zk6By5kGl4TbqNC:YlFqfqxLARFN+8wGN5zk+yiVPnbM

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

divdemoce.duckdns.org:35639

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    dtas.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-GZATCK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
    "C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:536
    • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
      C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
        C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe /stext "C:\Users\Admin\AppData\Local\Temp\cavktqlep"
        3⤵
          PID:3184
        • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
          C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe /stext "C:\Users\Admin\AppData\Local\Temp\cavktqlep"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2632
        • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
          C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe /stext "C:\Users\Admin\AppData\Local\Temp\muivujwyddsq"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:2948
        • C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe
          C:\Users\Admin\AppData\Local\Temp\648cf8b93fa2f02344ef0ab1684a0e6cfb45b61a21f79890c5183e8068f6a1fa.exe /stext "C:\Users\Admin\AppData\Local\Temp\xxonvbgzzlkuqdu"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2052

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bmr01kga.lga.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\cavktqlep

      Filesize

      4KB

      MD5

      b891b5489cce16fc87e912561bde5993

      SHA1

      08a8441427e19e47c4bd412c89d43b9904ac57bb

      SHA256

      f0743811f753d2fe3176907e4388d752b1d3e62a16863b31638f8dcf98767235

      SHA512

      6a81ff2e45f86c377614ee8696ca86a0ccbdcb3edd9225b70808aca45eaf3e2fc18cfa67486f46be30ef1862579cb1d1016c4b2368c94fb6432d80f4b9f5dd43

    • C:\Users\Admin\AppData\Roaming\remcos\dtas.dat

      Filesize

      144B

      MD5

      cb98452d4cf2cc1d38a9e550f6ef4b27

      SHA1

      4891e658546fa4799d6f7e9f54ab2d9ac4f4a5c8

      SHA256

      4b916e9823d030f30acbc0e25b359ba210380064242f51ae71859e57aa4fab1f

      SHA512

      6f35ea0514e7f96713291b3bf873e339276389737a0283c15d3a2fa6f89d6fa3fe0b319661540e110ed70c672dd11e50f4dfcbb90cb1da52f805d2659276aa74

    • memory/536-159-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-141-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-139-0x0000000004CF0000-0x0000000004D26000-memory.dmp

      Filesize

      216KB

    • memory/536-160-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-149-0x0000000005C60000-0x0000000005CC6000-memory.dmp

      Filesize

      408KB

    • memory/536-154-0x00000000062C0000-0x00000000062DE000-memory.dmp

      Filesize

      120KB

    • memory/536-155-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-161-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-157-0x00000000067C0000-0x00000000067DA000-memory.dmp

      Filesize

      104KB

    • memory/536-142-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/536-140-0x0000000005390000-0x00000000059B8000-memory.dmp

      Filesize

      6.2MB

    • memory/536-156-0x0000000007920000-0x0000000007F9A000-memory.dmp

      Filesize

      6.5MB

    • memory/536-143-0x0000000005AC0000-0x0000000005B26000-memory.dmp

      Filesize

      408KB

    • memory/1764-134-0x0000000005720000-0x0000000005CC4000-memory.dmp

      Filesize

      5.6MB

    • memory/1764-158-0x0000000005490000-0x00000000054A0000-memory.dmp

      Filesize

      64KB

    • memory/1764-133-0x0000000000800000-0x000000000084A000-memory.dmp

      Filesize

      296KB

    • memory/1764-137-0x0000000005490000-0x00000000054A0000-memory.dmp

      Filesize

      64KB

    • memory/1764-136-0x0000000005100000-0x000000000510A000-memory.dmp

      Filesize

      40KB

    • memory/1764-138-0x0000000007520000-0x0000000007542000-memory.dmp

      Filesize

      136KB

    • memory/1764-135-0x0000000005170000-0x0000000005202000-memory.dmp

      Filesize

      584KB

    • memory/2052-191-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2052-194-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2052-192-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2052-187-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2632-198-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2632-201-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2632-189-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2632-185-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2632-181-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2948-186-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2948-193-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2948-188-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2948-182-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB

    • memory/2972-178-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-180-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-177-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-176-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-175-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-174-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-173-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-172-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-171-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-169-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-168-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-167-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-203-0x0000000010000000-0x0000000010019000-memory.dmp

      Filesize

      100KB

    • memory/2972-206-0x0000000010000000-0x0000000010019000-memory.dmp

      Filesize

      100KB

    • memory/2972-207-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-208-0x0000000010000000-0x0000000010019000-memory.dmp

      Filesize

      100KB

    • memory/2972-209-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-210-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-212-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-165-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-218-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-219-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-226-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-227-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-234-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-235-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-242-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2972-243-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB