Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs
Resource
win10v2004-20230915-en
General
-
Target
38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs
-
Size
1.0MB
-
MD5
babe1890ad4fd7c930ed7597731af200
-
SHA1
e09d80133802b67d4f8fb75e33aeaba3d6490c4b
-
SHA256
38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a
-
SHA512
a31ae128abd73a84e2fea8aace7a6678aa1c5eea8ad4f5abcd480b8ea853674f28329da4d320bd481002ad50cff929b8f1168ba6775ffee0935b9005a16fb99e
-
SSDEEP
12288:H+VwTRAsUiSCywRckyI9eY9NMTRG5HswskHL/bZF7C4g4LYyAKRI0IumIm2QJeM:HMwTSRiiCO4sWM
Malware Config
Extracted
remcos
LUX0
141.95.84.40:2222
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
13v31v11b33131v11b-JAMHM7
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation WSCRIPT.EXE -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs WSCRIPT.EXE -
Loads dropped DLL 5 IoCs
pid Process 1336 regsvr32.exe 872 WSCRIPT.EXE 1568 regsvr32.exe 3436 regsvr32.exe 2144 regsvr32.exe -
Registers COM server for autorun 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 872 set thread context of 1896 872 WSCRIPT.EXE 91 PID 872 set thread context of 780 872 WSCRIPT.EXE 96 PID 872 set thread context of 2764 872 WSCRIPT.EXE 98 PID 872 set thread context of 3432 872 WSCRIPT.EXE 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4924 wrote to memory of 872 4924 WScript.exe 86 PID 4924 wrote to memory of 872 4924 WScript.exe 86 PID 4924 wrote to memory of 872 4924 WScript.exe 86 PID 872 wrote to memory of 1336 872 WSCRIPT.EXE 89 PID 872 wrote to memory of 1336 872 WSCRIPT.EXE 89 PID 872 wrote to memory of 1336 872 WSCRIPT.EXE 89 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1896 872 WSCRIPT.EXE 91 PID 872 wrote to memory of 1568 872 WSCRIPT.EXE 94 PID 872 wrote to memory of 1568 872 WSCRIPT.EXE 94 PID 872 wrote to memory of 1568 872 WSCRIPT.EXE 94 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 780 872 WSCRIPT.EXE 96 PID 872 wrote to memory of 3436 872 WSCRIPT.EXE 97 PID 872 wrote to memory of 3436 872 WSCRIPT.EXE 97 PID 872 wrote to memory of 3436 872 WSCRIPT.EXE 97 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2764 872 WSCRIPT.EXE 98 PID 872 wrote to memory of 2144 872 WSCRIPT.EXE 99 PID 872 wrote to memory of 2144 872 WSCRIPT.EXE 99 PID 872 wrote to memory of 2144 872 WSCRIPT.EXE 99 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100 PID 872 wrote to memory of 3432 872 WSCRIPT.EXE 100
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SYSWOW64\WSCRIPT.EXE"C:\Windows\SYSWOW64\WSCRIPT.EXE" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\38e0af644ef980b21487b6e16dbaf21119014f3364c2d23ded1f52788b88421a_JC.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1896
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:1568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:780
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2764
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
Filesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b