Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
PhotoLenawwwonlyfanscomht.hta
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
PhotoLenawwwonlyfanscomht.hta
Resource
win10v2004-20230621-en
General
-
Target
PhotoLenawwwonlyfanscomht.hta
-
Size
2.2MB
-
MD5
1712096de4eb3903b8a96344654a8c2e
-
SHA1
059376a2ee0683a47d85f3a7fa5425c1c52aebd8
-
SHA256
c73dd00623cd37f39e0f9af1deb4887240645255b9f9032ef76d95d5fa13b25d
-
SHA512
bd91238d234b31cbcd8907d80b2561d0bd518a25d494b7420caabc18f702264fd0cf3882173c09899188453850d4fc016ab250cadfe4afe7b0c2f696e01b295b
-
SSDEEP
1536:cXO5XO5XON8HYeCS2oGZxWhtfjefXUxkEErYTSZCuSCU7MHvf/H7HLL7Mba4wzFv:n
Malware Config
Extracted
remcos
RemoteHost
141.95.84.40:4010
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6YSYT9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.js mshta.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.hta mshta.exe -
Loads dropped DLL 5 IoCs
pid Process 1212 regsvr32.exe 3212 WScript.exe 3900 regsvr32.exe 3992 regsvr32.exe 3264 regsvr32.exe -
Registers COM server for autorun 1 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3212 set thread context of 4512 3212 WScript.exe 85 PID 3212 set thread context of 1536 3212 WScript.exe 93 PID 3212 set thread context of 1596 3212 WScript.exe 95 PID 3212 set thread context of 1200 3212 WScript.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2764 4512 WerFault.exe 85 3940 4512 WerFault.exe 85 1520 4512 WerFault.exe 85 -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\Local Settings mshta.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3212 1372 mshta.exe 83 PID 1372 wrote to memory of 3212 1372 mshta.exe 83 PID 1372 wrote to memory of 3212 1372 mshta.exe 83 PID 3212 wrote to memory of 1212 3212 WScript.exe 84 PID 3212 wrote to memory of 1212 3212 WScript.exe 84 PID 3212 wrote to memory of 1212 3212 WScript.exe 84 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 4512 3212 WScript.exe 85 PID 3212 wrote to memory of 3900 3212 WScript.exe 87 PID 3212 wrote to memory of 3900 3212 WScript.exe 87 PID 3212 wrote to memory of 3900 3212 WScript.exe 87 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 1536 3212 WScript.exe 93 PID 3212 wrote to memory of 3992 3212 WScript.exe 94 PID 3212 wrote to memory of 3992 3212 WScript.exe 94 PID 3212 wrote to memory of 3992 3212 WScript.exe 94 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 1596 3212 WScript.exe 95 PID 3212 wrote to memory of 3264 3212 WScript.exe 96 PID 3212 wrote to memory of 3264 3212 WScript.exe 96 PID 3212 wrote to memory of 3264 3212 WScript.exe 96 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97 PID 3212 wrote to memory of 1200 3212 WScript.exe 97
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\PhotoLenawwwonlyfanscomht.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Drops startup file
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\temp_1687875653581.vbs"2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 804⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 884⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 1164⤵
- Program crash
PID:1520
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1536
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1596
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4512 -ip 45121⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4512 -ip 45121⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4512 -ip 45121⤵PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
1.1MB
MD5b92ecfcad42f8611fde924db98875e06
SHA13503c3b3e39564290964cfbf5f011d9e61efc7e4
SHA256069063d2e9f7fa975ba80f6d6aa71ad919f4e37ec9a76d60beb618a4666eda9e
SHA51239aa0eb3cf722a351ed5172e5d766d6dd3ed4f13c97ad19899a74674656aae58e98cab2930dbcc33f5ab992103d1c2222d0dc0ed3fae14c3b86ca035bb26d5b3