Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 14:19

General

  • Target

    9286304f3592ab2de2d549722e6869b8.exe

  • Size

    1.6MB

  • MD5

    9286304f3592ab2de2d549722e6869b8

  • SHA1

    fee5ef729c85412275c371da5d1360fae7a87e44

  • SHA256

    90199e919b753c405f76a253d0994209b7231e9f1927d9af81e6bc022f93235b

  • SHA512

    59e323202b6c9ba2239e8eaf2d6c4bc416a61ce28edeace8655791b81023c253aba6f87075752bbbe3d127fd45837bd7d3abfc44f768266cc1325289ce030d9a

  • SSDEEP

    49152:MrS/XYg7k3aKoznVWeOYvsEyKbNWCpQf:MiXPjB5PFJy

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

212.193.30.230:3343

79.110.49.161:3343

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CQL1U6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe
    "C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell set-mppreference -exclusionpath C:\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell set-mppreference -exclusionpath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    72ce5e9b8fe196aa4e7738eec216c8ee

    SHA1

    bd32b19bc4867ddb9ae65389941f45b459a88e07

    SHA256

    6c245f51e0713d0571f557d3bfad9dde5050bfbf0f0afd58700515fc7b621d4d

    SHA512

    c4d19590eb943544db572869ce031736c4bd397617c072b8363c051c8d778482625b4a780f17399f111a961b512fdf05939e89aa0d13a3a2252c0ff112784767

  • memory/816-54-0x0000000000C00000-0x0000000000D9A000-memory.dmp

    Filesize

    1.6MB

  • memory/816-55-0x0000000074AF0000-0x00000000751DE000-memory.dmp

    Filesize

    6.9MB

  • memory/816-56-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/816-57-0x0000000005340000-0x0000000005434000-memory.dmp

    Filesize

    976KB

  • memory/816-58-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-59-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-61-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-63-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-65-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-67-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-69-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-71-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-73-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-75-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-77-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-79-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-81-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-83-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-85-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-87-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-89-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-91-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-93-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-95-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-97-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-99-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-101-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-103-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-105-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-107-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-109-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-111-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-113-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-115-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-117-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-119-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-121-0x0000000005340000-0x000000000542F000-memory.dmp

    Filesize

    956KB

  • memory/816-1072-0x0000000074AF0000-0x00000000751DE000-memory.dmp

    Filesize

    6.9MB

  • memory/816-1135-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB

  • memory/816-1136-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/816-1137-0x0000000000B30000-0x0000000000BA0000-memory.dmp

    Filesize

    448KB

  • memory/816-1138-0x00000000021A0000-0x00000000021EC000-memory.dmp

    Filesize

    304KB

  • memory/816-1161-0x0000000074AF0000-0x00000000751DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1076-1166-0x000000006FD80000-0x000000007032B000-memory.dmp

    Filesize

    5.7MB

  • memory/1076-1167-0x000000006FD80000-0x000000007032B000-memory.dmp

    Filesize

    5.7MB

  • memory/1076-1169-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1076-1170-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1076-1171-0x0000000002420000-0x0000000002460000-memory.dmp

    Filesize

    256KB

  • memory/1076-1172-0x000000006FD80000-0x000000007032B000-memory.dmp

    Filesize

    5.7MB

  • memory/1536-1168-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/1536-1174-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB