Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2023, 12:04

General

  • Target

    38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs

  • Size

    1.0MB

  • MD5

    babe1890ad4fd7c930ed7597731af200

  • SHA1

    e09d80133802b67d4f8fb75e33aeaba3d6490c4b

  • SHA256

    38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a

  • SHA512

    a31ae128abd73a84e2fea8aace7a6678aa1c5eea8ad4f5abcd480b8ea853674f28329da4d320bd481002ad50cff929b8f1168ba6775ffee0935b9005a16fb99e

  • SSDEEP

    12288:H+VwTRAsUiSCywRckyI9eY9NMTRG5HswskHL/bZF7C4g4LYyAKRI0IumIm2QJeM:HMwTSRiiCO4sWM

Malware Config

Extracted

Family

remcos

Botnet

LUX0

C2

141.95.84.40:2222

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    13v31v11b33131v11b-JAMHM7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Registers COM server for autorun 1 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\SYSWOW64\WSCRIPT.EXE
      "C:\Windows\SYSWOW64\WSCRIPT.EXE" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:1336
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:1896
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
          3⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Modifies registry class
          PID:1568
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:780
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
            3⤵
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:3436
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:2764
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll
              3⤵
              • Loads dropped DLL
              • Registers COM server for autorun
              • Modifies registry class
              PID:2144
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:3432

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

            Filesize

            13KB

            MD5

            e0b8dfd17b8e7de760b273d18e58b142

            SHA1

            801509fb6783c9e57edc67a72dde3c62080ffbaf

            SHA256

            4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

            SHA512

            443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

          • memory/780-28-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/780-26-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/780-25-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/872-37-0x0000000004740000-0x0000000004741000-memory.dmp

            Filesize

            4KB

          • memory/872-30-0x00000000043C0000-0x00000000043C1000-memory.dmp

            Filesize

            4KB

          • memory/872-9-0x00000000042A0000-0x00000000042A1000-memory.dmp

            Filesize

            4KB

          • memory/872-23-0x0000000004320000-0x0000000004321000-memory.dmp

            Filesize

            4KB

          • memory/1896-14-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-11-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-18-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-17-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-16-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-12-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-19-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-52-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-51-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-47-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-10-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-50-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-49-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-48-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-43-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-44-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-46-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/1896-45-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/2764-32-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/2764-35-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/2764-33-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/3432-42-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/3432-40-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB

          • memory/3432-39-0x0000000000400000-0x0000000000482000-memory.dmp

            Filesize

            520KB