Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 14:19

General

  • Target

    9286304f3592ab2de2d549722e6869b8.exe

  • Size

    1.6MB

  • MD5

    9286304f3592ab2de2d549722e6869b8

  • SHA1

    fee5ef729c85412275c371da5d1360fae7a87e44

  • SHA256

    90199e919b753c405f76a253d0994209b7231e9f1927d9af81e6bc022f93235b

  • SHA512

    59e323202b6c9ba2239e8eaf2d6c4bc416a61ce28edeace8655791b81023c253aba6f87075752bbbe3d127fd45837bd7d3abfc44f768266cc1325289ce030d9a

  • SSDEEP

    49152:MrS/XYg7k3aKoznVWeOYvsEyKbNWCpQf:MiXPjB5PFJy

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

212.193.30.230:3343

79.110.49.161:3343

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-CQL1U6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe
    "C:\Users\Admin\AppData\Local\Temp\9286304f3592ab2de2d549722e6869b8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell set-mppreference -exclusionpath C:\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell set-mppreference -exclusionpath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
        PID:4536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:3088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      6d73a225b61fa0f527a350da8c87e08d

      SHA1

      9e156d29b9a5f2b3f6a50a0edfb5377618d1ddb3

      SHA256

      86922e8b4b9f4fca40c7606b39b62205d8c79e45ae441bab21d02a1611aa99cd

      SHA512

      9fb6b010ede2a1672ef6896195494756da77bd0d740c9103e02977190a7818b3b0ef8c8cfc9b1acd210ac4e1b0611f8dc2c1fd47ae34b48491078764903ebbae

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qipwp0sp.p5k.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1056-1249-0x0000000070E10000-0x0000000070E5C000-memory.dmp

      Filesize

      304KB

    • memory/1056-1267-0x0000000007E20000-0x0000000007E28000-memory.dmp

      Filesize

      32KB

    • memory/1056-1248-0x0000000006DB0000-0x0000000006DE2000-memory.dmp

      Filesize

      200KB

    • memory/1056-1266-0x0000000007E40000-0x0000000007E5A000-memory.dmp

      Filesize

      104KB

    • memory/1056-1265-0x0000000007D30000-0x0000000007D3E000-memory.dmp

      Filesize

      56KB

    • memory/1056-1263-0x0000000007D80000-0x0000000007E16000-memory.dmp

      Filesize

      600KB

    • memory/1056-1262-0x0000000007B70000-0x0000000007B7A000-memory.dmp

      Filesize

      40KB

    • memory/1056-1261-0x0000000007B00000-0x0000000007B1A000-memory.dmp

      Filesize

      104KB

    • memory/1056-1247-0x0000000002E90000-0x0000000002EA0000-memory.dmp

      Filesize

      64KB

    • memory/1056-1259-0x0000000006D90000-0x0000000006DAE000-memory.dmp

      Filesize

      120KB

    • memory/1056-1227-0x0000000074650000-0x0000000074E00000-memory.dmp

      Filesize

      7.7MB

    • memory/1056-1270-0x0000000074650000-0x0000000074E00000-memory.dmp

      Filesize

      7.7MB

    • memory/1056-1260-0x0000000008140000-0x00000000087BA000-memory.dmp

      Filesize

      6.5MB

    • memory/1056-1246-0x0000000005570000-0x000000000558E000-memory.dmp

      Filesize

      120KB

    • memory/1056-1241-0x0000000006190000-0x00000000061F6000-memory.dmp

      Filesize

      408KB

    • memory/1056-1221-0x0000000002EE0000-0x0000000002F16000-memory.dmp

      Filesize

      216KB

    • memory/1056-1235-0x0000000005FF0000-0x0000000006056000-memory.dmp

      Filesize

      408KB

    • memory/1056-1234-0x0000000005F50000-0x0000000005F72000-memory.dmp

      Filesize

      136KB

    • memory/1056-1230-0x00000000058F0000-0x0000000005F18000-memory.dmp

      Filesize

      6.2MB

    • memory/1056-1229-0x0000000002E90000-0x0000000002EA0000-memory.dmp

      Filesize

      64KB

    • memory/3088-1232-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/3088-1271-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/3640-158-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-170-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-178-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-180-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-182-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-184-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-186-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-188-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-190-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-192-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-194-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-196-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-198-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-200-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-202-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-1160-0x0000000074650000-0x0000000074E00000-memory.dmp

      Filesize

      7.7MB

    • memory/3640-1216-0x0000000005060000-0x0000000005061000-memory.dmp

      Filesize

      4KB

    • memory/3640-174-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-1224-0x0000000074650000-0x0000000074E00000-memory.dmp

      Filesize

      7.7MB

    • memory/3640-1222-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB

    • memory/3640-172-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-176-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-168-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-166-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-164-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-162-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-160-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-133-0x0000000074650000-0x0000000074E00000-memory.dmp

      Filesize

      7.7MB

    • memory/3640-156-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-154-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-152-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-150-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-148-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-146-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-144-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-142-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-140-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-139-0x0000000006440000-0x000000000652F000-memory.dmp

      Filesize

      956KB

    • memory/3640-138-0x0000000004C70000-0x0000000004C7A000-memory.dmp

      Filesize

      40KB

    • memory/3640-137-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB

    • memory/3640-136-0x0000000004BC0000-0x0000000004C52000-memory.dmp

      Filesize

      584KB

    • memory/3640-135-0x0000000005070000-0x0000000005614000-memory.dmp

      Filesize

      5.6MB

    • memory/3640-134-0x0000000000030000-0x00000000001CA000-memory.dmp

      Filesize

      1.6MB