Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2023, 06:57

General

  • Target

    Product Inquiry list_1.rtf

  • Size

    40KB

  • MD5

    1f17c3775584429ef126cd4afb0ad7ca

  • SHA1

    87dd20bd063aeb6d345bb7e678f5feaf2d70c6f2

  • SHA256

    2490954c3b255bfb810b9552a52e58607dab2b9b5c2e551b1d0934583c11a603

  • SHA512

    52a97dd8bef40947659eedb2bd2c865c48b08d8fe3d8b7e399fd73f651219fa9fd9821a881abe47dc20a440ed047c7ecb50dc7e801d361081a8138a2bac5972c

  • SSDEEP

    768:8Fx0XaIsnPRIa4fwJMl8h5YLzbw106i7cK5d2/cip0gLvMTeIQ3btj:8f0Xvx3EMQ6zbw6J7cAYcu0gLEeIspj

Malware Config

Extracted

Family

remcos

Botnet

LOG

C2

5.253.114.108:2022

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    chromes.exe

  • copy_folder

    chromes

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-456ENB

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Product Inquiry list_1.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1416
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe
        "C:\Users\Admin\AppData\Roaming\papiodfd467651.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe
          "C:\Users\Admin\AppData\Roaming\papiodfd467651.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\ProgramData\chromes\chromes.exe
            "C:\ProgramData\chromes\chromes.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\ProgramData\chromes\chromes.exe
              "C:\ProgramData\chromes\chromes.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\chromes\chromes.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\ProgramData\chromes\chromes.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\ProgramData\chromes\chromes.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\Users\Admin\AppData\Local\Temp\dzpynfhc.kke

      Filesize

      7KB

      MD5

      2da2f9b58155b21faccd9352055bc74d

      SHA1

      6099e2b423926ba86fd13297f6944a7ff88dd34f

      SHA256

      c701d68d498da31f667d4878936ca9ac7d17b5c6b4c1bcbf9d26ce96ebc98911

      SHA512

      7804999a641b751e2793c3bdb51dd29dd8261d5cc6ac835a29f2de71c7b0825a698debce789eb61dfa7845d3f9756f31fc92b9b53128fb5f3ba7d46062a42a54

    • C:\Users\Admin\AppData\Local\Temp\nsj2475.tmp\jzowju.dll

      Filesize

      4KB

      MD5

      ad28a4eb8b1c753de37dd6fb281e6e29

      SHA1

      a9a95e4033e96ce2dd6d542a7d8cb16175aed1d0

      SHA256

      7a613cced366b6345cd15449036a5ab7559058ca2988bbb267e655c71438cf33

      SHA512

      9c610092d8fac325058f02b4e7928c3123234f0188507841531deda77fa6109ae7216b9a38aaae3a3bb2bdf0cb2e3bad4b7d07bc958df4122bf8e7f7a87e7011

    • C:\Users\Admin\AppData\Local\Temp\yzvgyrxhu.tfc

      Filesize

      501KB

      MD5

      9253abb755a9ba6a746031aee8d56236

      SHA1

      ca16aa47369feb257911389414b80765691570fc

      SHA256

      f8d7fff833325442cf0e4cf6bb5d8457bff4d55d3de1b04115bd681ac903376f

      SHA512

      e73ab6277898b14fc5289478c9bd19c2cd960eeb8f300038af9d0b27d36aa8bb2e6fa2a85a4ef2a9a1a79cb9c0a2e243903d947cfdfec838020d3412d0b3ccab

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9f28ee204cf2d753dfd62a3e184e6295

      SHA1

      a5f217cca9a45a79116281b373deb49d8478fea7

      SHA256

      720c7ea3440037351666367e2d3d13840677768f2e18ca11c8596bf84c11f828

      SHA512

      5445fdfb98292612bab295823c8b7f038a701aa08040e2368c949f30686b17fd523b16288706692ed39e3774302b3cb0ea87c858dd3524a75bc6c8b7b0b588a7

    • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • C:\Users\Admin\AppData\Roaming\papiodfd467651.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • \ProgramData\chromes\chromes.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • \Users\Admin\AppData\Local\Temp\nsj2475.tmp\jzowju.dll

      Filesize

      4KB

      MD5

      ad28a4eb8b1c753de37dd6fb281e6e29

      SHA1

      a9a95e4033e96ce2dd6d542a7d8cb16175aed1d0

      SHA256

      7a613cced366b6345cd15449036a5ab7559058ca2988bbb267e655c71438cf33

      SHA512

      9c610092d8fac325058f02b4e7928c3123234f0188507841531deda77fa6109ae7216b9a38aaae3a3bb2bdf0cb2e3bad4b7d07bc958df4122bf8e7f7a87e7011

    • \Users\Admin\AppData\Local\Temp\nst28A9.tmp\jzowju.dll

      Filesize

      4KB

      MD5

      ad28a4eb8b1c753de37dd6fb281e6e29

      SHA1

      a9a95e4033e96ce2dd6d542a7d8cb16175aed1d0

      SHA256

      7a613cced366b6345cd15449036a5ab7559058ca2988bbb267e655c71438cf33

      SHA512

      9c610092d8fac325058f02b4e7928c3123234f0188507841531deda77fa6109ae7216b9a38aaae3a3bb2bdf0cb2e3bad4b7d07bc958df4122bf8e7f7a87e7011

    • \Users\Admin\AppData\Roaming\papiodfd467651.exe

      Filesize

      527KB

      MD5

      4daef76971794649d0c0bcc97a9fd246

      SHA1

      49522f33f7f2852d9637c98d560437b4d88adcd5

      SHA256

      3da90b636e39cd1f67e3542c60d813c6ff8152f7f740b3ef4ef086ef120836df

      SHA512

      3d83321a39384eb101ab261fc91444b400cae918d4422b8f298cda8eed73dad155ca9324235ba9e6a47316017498ad5fb6cde0111f3a111786aa47679a6b9a0a

    • memory/628-80-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/628-87-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/628-77-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/884-75-0x0000000001D80000-0x0000000001D82000-memory.dmp

      Filesize

      8KB

    • memory/916-123-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-135-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-108-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-107-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-109-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-110-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-111-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-112-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-113-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-114-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-115-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-116-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-117-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-118-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-119-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-120-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-121-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-105-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-124-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-125-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-126-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-127-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-128-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-130-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-132-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-133-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-134-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-106-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-136-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-138-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-139-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-140-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-141-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-142-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-143-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-145-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-146-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-147-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-148-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-149-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-150-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-151-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-152-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-153-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-154-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-155-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-156-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-157-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-158-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-159-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-160-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-161-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-162-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/916-163-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/1176-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB