Analysis

  • max time kernel
    297s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    26-05-2023 20:54

General

  • Target

    https://drive.google.com/file/d/19ISSpz1AzqavuWpBmAOD1vcHFhigxt28/view?usp=drive_web

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

seba2580.duckdns.org:2580

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-ET3CRD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/19ISSpz1AzqavuWpBmAOD1vcHFhigxt28/view?usp=drive_web
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5092 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3340
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:788
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1748
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4756
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2832
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\structure"
          3⤵
            PID:3716
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\structure\structure.exe'" /f
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3556
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\structure\structure.exe'" /f
              4⤵
              • Creates scheduled task(s)
              PID:3548
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe" "C:\Users\Admin\AppData\Roaming\structure\structure.exe"
            3⤵
              PID:3288

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Scripting

        1
        T1064

        Modify Registry

        2
        T1112

        Discovery

        Query Registry

        1
        T1012

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
          Filesize

          471B

          MD5

          3b2daafe6506b789e6b8b0a9c4eb42cc

          SHA1

          da166c0ddf9e4065561b8849c8a841148797bd46

          SHA256

          65c2f718c41a8b2a8bfa7709fcd48d70ec0546c7e8ff80d83076fec0d8db1943

          SHA512

          2398cb5a868b7fc6638531994ffb1f149db0f231e89fcdc53e4d5a0b44c81cb12aed855675893e27e3b5b48a3e2e10076d403bb697a3319af702ddff62de4173

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
          Filesize

          404B

          MD5

          0e441adfd75c0c1c04310796cea6338a

          SHA1

          73b44685ad4bdfeb6aa29d05a836d2b568098009

          SHA256

          8d2fa20eb3af6c51479438697d5b20569db322e1668fffe56b598498735e3ad5

          SHA512

          19ca9487403db5d7b8a468a4f508763348fa8f03487eac94fb184f34b3430a12f9da72ad59d3567622e0623cd1107aaa76731c185065b87823af22501fa7fd81

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\osplltc\imagestore.dat
          Filesize

          1KB

          MD5

          751c92c9a582aa9e8415f4666c1b7a6b

          SHA1

          08a1fc79384087f3f35cc197cf393ea0d172ec18

          SHA256

          a416f63144bbe4c3cd82b062644a61406faf5352886c87b6ed852fa9fabfa605

          SHA512

          fad6454782b4508754a77c5878c643271c84eede48739082d7981d0b644de5b770360d23af311eac993204e0e44376846f1b08217dba160d44bd63623ee0a530

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\osplltc\imagestore.dat
          Filesize

          2KB

          MD5

          80ceacab15967f9559999f08e5c3570f

          SHA1

          c4f303a058de51cff66ab88eef01f77660144939

          SHA256

          780bcc1e91a7d3c67badf47c90b6f5c279e76c677545d252fcc32b2e0bc780c5

          SHA512

          c7246328a5985542c41115d53686c549e5036ca45cdef8e98e6616cba486539ede387729ce4c2193f40f76f6bbcc0f139edbc6962bd5c6ec41193c6cb6fe8c73

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1IYUAPIF\cb=gapi[1].js
          Filesize

          71KB

          MD5

          532655ad32d7392fbd756a13971eaca5

          SHA1

          3762be5ac389483aa259560db54064a0e65b6dbd

          SHA256

          211e59d3d3dd0a6e43a866197a6214e70da275b60eecc85cd5a8b6a7e9b46d9e

          SHA512

          30153f19ccede229a0a682b35c45eaa762457dc3b862ffde85a84128bc3b849c3bf3f4d41b0ff78b6dc24490d387051f8029e2a34fe0cff55d45370c71b5807e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1IYUAPIF\cleardot[1].gif
          Filesize

          43B

          MD5

          fc94fb0c3ed8a8f909dbc7630a0987ff

          SHA1

          56d45f8a17f5078a20af9962c992ca4678450765

          SHA256

          2dfe28cbdb83f01c940de6a88ab86200154fd772d568035ac568664e52068363

          SHA512

          c87bf81fd70cf6434ca3a6c05ad6e9bd3f1d96f77dddad8d45ee043b126b2cb07a5cf23b4137b9d8462cd8a9adf2b463ab6de2b38c93db72d2d511ca60e3b57e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S1Q31HZS\drive_2020q4_32dp[1].png
          Filesize

          831B

          MD5

          916c9bcccf19525ad9d3cd1514008746

          SHA1

          9ccce6978d2417927b5150ffaac22f907ff27b6e

          SHA256

          358e814139d3ed8469b36935a071be6696ccad7dd9bdbfdb80c052b068ae2a50

          SHA512

          b73c1a81997abe12dba4ae1fa38f070079448c3798e7161c9262ccba6ee6a91e8a243f0e4888c8aef33ce1cf83818fc44c85ae454a522a079d08121cd8628d00

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S1Q31HZS\drive_2022q3_32dp[1].png
          Filesize

          1KB

          MD5

          c66f20f2e39eb2f6a0a4cdbe0d955e5f

          SHA1

          575ef086ce461e0ef83662e3acb3c1a789ebb0a8

          SHA256

          2ab9cd0ffdddf7bf060620ae328fe626bfa2c004739adedb74ec894faf9bee31

          SHA512

          b9c44a2113fb078d83e968dc0af2e78995bb6dd4ca25abff31e9ab180849c5de3036b69931cca295ac64155d5b168b634e35b7699f3fe65d4a30e9058a2639bd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYL8D8JJ\JUZGADO%20001%20PENAL%20DEL%20CIRCUITO[1].REV
          Filesize

          668KB

          MD5

          66d06c11fd961ebe4c9b8242aaa0ff71

          SHA1

          dd6f63a7be2dde24e67d3cdee326b4191945665e

          SHA256

          542e7506bc6047b71657d4eb797c56fb5e1ba5b7bf39713c77b362ce3b950be6

          SHA512

          1fd60bfbb861ea25135db41c062b13a6b407d2512a52586045d7c5d20e1655c8970357b247c947cae907521584958285b5976c3353f1412541b9975434633cbc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYL8D8JJ\suggestions[1].es-ES
          Filesize

          18KB

          MD5

          e2749896090665aeb9b29bce1a591a75

          SHA1

          59e05283e04c6c0252d2b75d5141ba62d73e9df9

          SHA256

          d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

          SHA512

          c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

        • C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe
          Filesize

          671.7MB

          MD5

          52f0d17600951b217803c37ddd4ccd66

          SHA1

          948a0bbd4eb758b12e0f0d9739b1f0bab729eda5

          SHA256

          2f3f89da762b0206388147a5ed8acec8814652922ac2386b35e5250a0593867e

          SHA512

          ad28ede76e2ac49b786de9df9d9d1d6a34cab090e7b9473ebb38517c4fd84938bb8e02210c6144759f7a780129fdb71b75b84c0d1da1d599c97a7e1746c9b04c

        • C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe
          Filesize

          548.6MB

          MD5

          0c47403493d9746020b1242037b3812e

          SHA1

          98976104313a0c9b6eb6080318e5d8fd068cec8b

          SHA256

          a398e48f975f745a921e89172bb9fa8d16356cc4cb08bf1f19c07e1149ec62f8

          SHA512

          6373651177707a7b2325e98823a5cf6b8878ab5ab3508ed9ee4a77102a8b05cb3b6aa2c592633fb8711cd3325758f13da0dc75e306d600f3dfaa26029e3bab8e

        • C:\Users\Admin\AppData\Local\Temp\7zO44DED638\JUZGADO 001 PENAL DEL CIRCUITO.exe
          Filesize

          508.9MB

          MD5

          2503597ce6657c66957554ddef8c36e5

          SHA1

          7b96f06e3399eb9bb59d43e0048e9cfa637f34e2

          SHA256

          b681603f0e2da141521d5f24d672adcf8aee4c80b57e65cb3b989b9aea90f55f

          SHA512

          d135bb8a8ecf47290c58dee1303bfa107a6de104b6f2e248881d9bfed0a6bc397673e980d8b801dff917a637d947a4aafbfe19d2d07e47f82f00b7a0d3542558

        • C:\Users\Admin\Downloads\JUZGADO 001 PENAL DEL CIRCUITO.REV.9vwp7kt.partial
          Filesize

          668KB

          MD5

          66d06c11fd961ebe4c9b8242aaa0ff71

          SHA1

          dd6f63a7be2dde24e67d3cdee326b4191945665e

          SHA256

          542e7506bc6047b71657d4eb797c56fb5e1ba5b7bf39713c77b362ce3b950be6

          SHA512

          1fd60bfbb861ea25135db41c062b13a6b407d2512a52586045d7c5d20e1655c8970357b247c947cae907521584958285b5976c3353f1412541b9975434633cbc

        • memory/2832-292-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-302-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-335-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-334-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-285-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-286-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-287-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-288-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-290-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-291-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-332-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-293-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-294-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-296-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-297-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-298-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-301-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-330-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-303-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-304-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-305-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-308-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-309-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-329-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-310-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-316-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-317-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-319-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-320-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-325-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/2832-326-0x0000000000400000-0x0000000000480000-memory.dmp
          Filesize

          512KB

        • memory/4756-311-0x0000000005090000-0x00000000050A0000-memory.dmp
          Filesize

          64KB

        • memory/4756-281-0x0000000005570000-0x0000000005B14000-memory.dmp
          Filesize

          5.6MB

        • memory/4756-280-0x0000000000640000-0x00000000006F6000-memory.dmp
          Filesize

          728KB

        • memory/4756-284-0x0000000005090000-0x00000000050A0000-memory.dmp
          Filesize

          64KB

        • memory/4756-283-0x00000000050B0000-0x0000000005142000-memory.dmp
          Filesize

          584KB