Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2023 10:00

General

  • Target

    OFFER REQUEST.exe

  • Size

    348KB

  • MD5

    12f1f8b544a44c9e417a7265a4c02a4c

  • SHA1

    20b172d83dcdb9974b8e222f14ea1e48eeccbfbe

  • SHA256

    c4a1a8af4c1336e8e69e1914959cbf3bc4bfe5221639a163244d19fd60e8af19

  • SHA512

    a462d5c3828d6fc6a40ff0dcb166abc6116008add3e8eb92be9b04ccd923c0b2abcc489eeb8b19c0805607063e76660948c9b5c985f0fff599080c94149c8acf

  • SSDEEP

    6144:tIw3EwpCED/b1Myi5LQyUXme7HkSv7QFkMaTfKSzRm9C42+krMwUuDP:Aob1MyaQLmesdhgRmIdgyz

Malware Config

Extracted

Family

remcos

Botnet

babynwaHost

C2

callito2024.sytes.net:2097

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ssc.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-JLXQ0I

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks QEMU agent file 2 TTPs 4 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OFFER REQUEST.exe
    "C:\Users\Admin\AppData\Local\Temp\OFFER REQUEST.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\OFFER REQUEST.exe
      "C:\Users\Admin\AppData\Local\Temp\OFFER REQUEST.exe"
      2⤵
      • Checks QEMU agent file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Users\Admin\AppData\Roaming\ssc.exe
        "C:\Users\Admin\AppData\Roaming\ssc.exe"
        3⤵
        • Checks QEMU agent file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Users\Admin\AppData\Roaming\ssc.exe
          "C:\Users\Admin\AppData\Roaming\ssc.exe"
          4⤵
          • Checks QEMU agent file
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetWindowsHookEx
          PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    25f7caa97f3fab4e24dde9b9ccac2cfd

    SHA1

    188aafdc4f0895d79647865be2d189ad14a0e5c8

    SHA256

    510ba96bd0cc1b9367ded01868ac1a25a7d506167f4a0885f0fbdc97426f143b

    SHA512

    b4c85eb46d4fa71efd67cc0b89a54c4c41ab991b4a375a90412b4f8f6e4e2a17693e1f4f1d96175f8b82e4986dcd8e66586ffd5e49dca9a6fd2bcc351c12a8d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    724B

    MD5

    aa62f8ce77e072c8160c71b5df3099b0

    SHA1

    06b8c07db93694a3fe73a4276283fabb0e20ac38

    SHA256

    3eb4927c4d9097dc924fcde21b56d01d5d1ef61b7d22bfb6786e3b546b33e176

    SHA512

    71724e837286c5f0eb2ee4ad01ac0304d4c7597bb2d46169c342821b0da04d8597491bd27ef80e817bc77031cd29d2182ccc82ef8ea3860696875f89427c8e0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D4D5A511944208643D9E0DD4100257E2
    Filesize

    471B

    MD5

    1bd88c1810daa241c22ae706ed0a6d6d

    SHA1

    58434157ce1fc6c8a860cf978d1052500916d0b9

    SHA256

    2f6c29db84f6429ab14658dda239578cf9abe4122c6558ed770ab85b8670016b

    SHA512

    b68c3b07a8e4d80b0085401b555b97d12239486e1bc3bcac4b2ff452681d8d05f4487b8e3f1f248577a002f836d0af7067e3cc4921dc5e5a1a8c474922fbd24a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_45D75838C7F63858DD83743CBBA8AB0A
    Filesize

    471B

    MD5

    fa8e79fb0e18e81028cfa427d87bb2ae

    SHA1

    8a9161e346469dad848953f5bfa5a642b2260aa4

    SHA256

    52018dada7692144689b5345f695af35e0dc01a5584d95f6bea9c96c33fc8a59

    SHA512

    d24e62b7f994ea29a48fa741aed3d92d34d54ef267040d62bb298378694f3ade3a45807228d18762222e1b6792a2b2f514426eb972164a6db01820094b0ec255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    bde5f64b4f781e28995c5286e0975953

    SHA1

    62050d64c8cee6ae21621fef894b0d596bb3bff7

    SHA256

    6c50c40e3531a551a9e7253b621e76353ec1a1ce7ed4b0308f1cb6c4f7782bf3

    SHA512

    9d56ba62a1d3bf4fa276fdb9a9afe292a3dd53f100973f4978229b8672f914010b593bc2a4ced8cb51a58130ad453b0cea23ce427475ddeb99c190afc3cbcde3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6deb2f7833a3a93180deb574a560aea4

    SHA1

    0f8fcd24ed1197db8e34c66e37c1fde9662f5f5f

    SHA256

    e69d5730eb8242132f2c56163d95847ef7bd1f89fcbea867130e34dbb306b377

    SHA512

    614cd7d6e1ee16df1b9ceb29d1a9e7321051deb2781443d5ce0fd1cb6d3ad577233ad53809110041f070b9e287b4492949c17137d479fe1b1cc6085641073959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    392B

    MD5

    3ea31277143f1b1800368d966b56e3be

    SHA1

    c4db689f299c359d81be6ebd51fc1278e2ad6504

    SHA256

    0980701f4807db005b8047316ebcdc0eda4561711a602c8fc20b7b40fb2c0f76

    SHA512

    fd0dbd22ed8d3bd3ba9181209dccae489937634aa1040d8c4aa421113a6fb829e2d9823817a62b9fb82a8ca45399f8575947edfd9142a7afdcd74ce0b90ef033

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D4D5A511944208643D9E0DD4100257E2
    Filesize

    414B

    MD5

    26f686945ca1f976e0168dd15a82708e

    SHA1

    9f738aaf56c7f94fb6f425a340a4159922e2cfb9

    SHA256

    820a93fa16d59c1aa6e67ac9df7f4947bd82266afb7f4308c35109677ea7481a

    SHA512

    24da0a2403d69e9c5b043bf3c1cf4be829348fe363e6773dc207d73648f9006340de2dd9ccaddd536b2ad46b4b6b0c8dd8b0c43a1340d1010ee2694762ffc4d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_45D75838C7F63858DD83743CBBA8AB0A
    Filesize

    414B

    MD5

    03973533b9ea9d8644c8cd1de08ec819

    SHA1

    ff29f8ad8c2f7cf13a322ff055fc67cafd4f9d98

    SHA256

    c51f6a8f8ede51c6a83129b3c55bc36dab2c61d78de4b0acbdd3f5cef97cd817

    SHA512

    978ffad974a7862dedee4069a76b52f1d22da84cf6929ff4e0d38f9b5b7d342f8d41e81ea9a2961ef92afbf5d8a5c423515abc865978e5433d5e2a0ec0175a99

  • C:\Users\Admin\AppData\Local\Temp\Cab7FBB.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\nsj1DC1.tmp\System.dll
    Filesize

    11KB

    MD5

    8b3830b9dbf87f84ddd3b26645fed3a0

    SHA1

    223bef1f19e644a610a0877d01eadc9e28299509

    SHA256

    f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    SHA512

    d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Imidazolyl.ini
    Filesize

    37B

    MD5

    2e6676d90bd2ad7fc51ad7aa5d517779

    SHA1

    b29f0d8b7a05e60821fd3947597a51c2958de40b

    SHA256

    19c6bfa0180b3b10165d73c608ede7ae408840ce09edbcf77b23626e452f2106

    SHA512

    10eed25590e731b492f0cb875dd7bbad1ffb46726398abc3121b573d9d56c03e643abb049ff8f83319422a39edf0577ea68f31ce2f6e31fdca398e5e6ae9b10b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Imidazolyl.ini
    Filesize

    37B

    MD5

    2e6676d90bd2ad7fc51ad7aa5d517779

    SHA1

    b29f0d8b7a05e60821fd3947597a51c2958de40b

    SHA256

    19c6bfa0180b3b10165d73c608ede7ae408840ce09edbcf77b23626e452f2106

    SHA512

    10eed25590e731b492f0cb875dd7bbad1ffb46726398abc3121b573d9d56c03e643abb049ff8f83319422a39edf0577ea68f31ce2f6e31fdca398e5e6ae9b10b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Natmadens\Subsidierne\Savourily132\Halvfabrikataenes\Systemtnkning\Reprovocation.Nar232
    Filesize

    400KB

    MD5

    f3987dd85e2fed4b37afd8622fadb582

    SHA1

    aa29d4dfbb90eb82d6eb97860d344f8e58fb7340

    SHA256

    cf555c27b6a89397a2752acf3f8c1aac9526d6da771d9c110f599c980b7ab5b1

    SHA512

    0bbb8454e070bfbf7521926d07c85758703150d6a9179d1921d25c482a5f0adc5d0b56f5c30a85e33c0ef681e6e0e5fdc637802303ad96cc9600b22bfc5943bf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Natmadens\Subsidierne\Savourily132\Strangle\Rebudget.Ban
    Filesize

    68KB

    MD5

    cfe6a933d04f6ff6d18548e48391a18b

    SHA1

    7f32e74ef298948b49c6c5eebd30dbe7cf986567

    SHA256

    2a0d45323340e9b941bc5448ae3d0701674f420be8bf9d329be94dd3c6bf4b9a

    SHA512

    76e6e9eb17777302765f80259cea22fdd4558e7bde3e4bd037a6532e13a36ab176c3a2d2994d99548c36bcac6968ab13646bb9fc0def332872dd4b45d3788d91

  • C:\Users\Admin\AppData\Roaming\ssc.exe
    Filesize

    348KB

    MD5

    12f1f8b544a44c9e417a7265a4c02a4c

    SHA1

    20b172d83dcdb9974b8e222f14ea1e48eeccbfbe

    SHA256

    c4a1a8af4c1336e8e69e1914959cbf3bc4bfe5221639a163244d19fd60e8af19

    SHA512

    a462d5c3828d6fc6a40ff0dcb166abc6116008add3e8eb92be9b04ccd923c0b2abcc489eeb8b19c0805607063e76660948c9b5c985f0fff599080c94149c8acf

  • C:\Users\Admin\AppData\Roaming\ssc.exe
    Filesize

    348KB

    MD5

    12f1f8b544a44c9e417a7265a4c02a4c

    SHA1

    20b172d83dcdb9974b8e222f14ea1e48eeccbfbe

    SHA256

    c4a1a8af4c1336e8e69e1914959cbf3bc4bfe5221639a163244d19fd60e8af19

    SHA512

    a462d5c3828d6fc6a40ff0dcb166abc6116008add3e8eb92be9b04ccd923c0b2abcc489eeb8b19c0805607063e76660948c9b5c985f0fff599080c94149c8acf

  • C:\Users\Admin\AppData\Roaming\ssc.exe
    Filesize

    348KB

    MD5

    12f1f8b544a44c9e417a7265a4c02a4c

    SHA1

    20b172d83dcdb9974b8e222f14ea1e48eeccbfbe

    SHA256

    c4a1a8af4c1336e8e69e1914959cbf3bc4bfe5221639a163244d19fd60e8af19

    SHA512

    a462d5c3828d6fc6a40ff0dcb166abc6116008add3e8eb92be9b04ccd923c0b2abcc489eeb8b19c0805607063e76660948c9b5c985f0fff599080c94149c8acf

  • \Users\Admin\AppData\Local\Temp\nsj1DC1.tmp\System.dll
    Filesize

    11KB

    MD5

    8b3830b9dbf87f84ddd3b26645fed3a0

    SHA1

    223bef1f19e644a610a0877d01eadc9e28299509

    SHA256

    f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    SHA512

    d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

  • \Users\Admin\AppData\Local\Temp\nsj1DC1.tmp\System.dll
    Filesize

    11KB

    MD5

    8b3830b9dbf87f84ddd3b26645fed3a0

    SHA1

    223bef1f19e644a610a0877d01eadc9e28299509

    SHA256

    f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    SHA512

    d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

  • \Users\Admin\AppData\Local\Temp\nsoEF32.tmp\System.dll
    Filesize

    11KB

    MD5

    8b3830b9dbf87f84ddd3b26645fed3a0

    SHA1

    223bef1f19e644a610a0877d01eadc9e28299509

    SHA256

    f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    SHA512

    d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

  • \Users\Admin\AppData\Local\Temp\nsoEF32.tmp\System.dll
    Filesize

    11KB

    MD5

    8b3830b9dbf87f84ddd3b26645fed3a0

    SHA1

    223bef1f19e644a610a0877d01eadc9e28299509

    SHA256

    f004c568d305cd95edbd704166fcd2849d395b595dff814bcc2012693527ac37

    SHA512

    d13cfd98db5ca8dc9c15723eee0e7454975078a776bce26247228be4603a0217e166058ebadc68090afe988862b7514cb8cb84de13b3de35737412a6f0a8ac03

  • \Users\Admin\AppData\Roaming\ssc.exe
    Filesize

    348KB

    MD5

    12f1f8b544a44c9e417a7265a4c02a4c

    SHA1

    20b172d83dcdb9974b8e222f14ea1e48eeccbfbe

    SHA256

    c4a1a8af4c1336e8e69e1914959cbf3bc4bfe5221639a163244d19fd60e8af19

    SHA512

    a462d5c3828d6fc6a40ff0dcb166abc6116008add3e8eb92be9b04ccd923c0b2abcc489eeb8b19c0805607063e76660948c9b5c985f0fff599080c94149c8acf

  • memory/836-105-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/836-74-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/836-75-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/836-76-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/836-77-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/836-78-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/836-115-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/836-112-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/836-101-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1040-134-0x00000000035C0000-0x0000000004D86000-memory.dmp
    Filesize

    23.8MB

  • memory/1040-133-0x00000000035C0000-0x0000000004D86000-memory.dmp
    Filesize

    23.8MB

  • memory/1292-72-0x00000000036C0000-0x0000000004E86000-memory.dmp
    Filesize

    23.8MB

  • memory/1292-73-0x00000000036C0000-0x0000000004E86000-memory.dmp
    Filesize

    23.8MB

  • memory/1976-158-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-136-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-137-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/1976-157-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/1976-138-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-162-0x0000000001470000-0x0000000002C36000-memory.dmp
    Filesize

    23.8MB

  • memory/1976-163-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-167-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-169-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-170-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-171-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-173-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1976-175-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB