Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2023 09:25

General

  • Target

    allegato_35.js

  • Size

    4KB

  • MD5

    28eccbb393ed8689497c2966337666df

  • SHA1

    2d4a2ea5d4252a84cd22854cdecc2092aac0c4c2

  • SHA256

    04e5b2ca6f0ed2eb8a36deaef7ec8a5ba5780aa07e133153eac2e120ffe41672

  • SHA512

    c01e9d9992ccf8e01476c9a81a604a50e683812820af44281209824c5aaee685913043e8b190f4000a63b41a1dcae744dc1b5118f0685ae799311218e5380f5b

  • SSDEEP

    96:TqKszBKK/HeX9vh7oUfCkHLlEjIhfOhjafVCz8TmA/sUHwFseGjtGjCDoUzk7/zx:TqK3K/+X9p7oUfCkHLlE8hfOhjafszEU

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

retghrtgwtrgtg.bounceme.net:3839

listpoints.click:7020

datastream.myvnc.com:5225

gservicese.com:2718

center.onthewifi.com:8118

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    explorer.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-OPX7KW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\allegato_35.js
    1⤵
    • Blocklisted process makes network request
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe
      "C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe
        C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            5⤵
              PID:2380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d3b3e9ba74783a3a820d57401ce86ff7

      SHA1

      2ea2d98b8bb31c524be625deb4d4ad9424deff8b

      SHA256

      8628a19d7ba9c62b449156497fb4295bf34eabf65be74920508b2d97f8058e6a

      SHA512

      a6b31f2c79fce317ff2c224b41687130700f7e03e8e1591af0ea6fae51bf927b967adbefd05cff6361f94f675c8a420a4af951e3a668fbca50ff01eae9b83300

    • C:\Users\Admin\AppData\Local\Temp\25e8868e

      Filesize

      1.1MB

      MD5

      7ac2329d81e32fd5f31cb7d28da9b3b4

      SHA1

      2821d04dbcf340956e896ee6748d879276791729

      SHA256

      b702a8bbeda0c4c70e2df7f10d0fc4469db29bf25969cbe5ec87db888844d9c8

      SHA512

      2804c6838a8b131ae80975aeb5908567f20e0edab084a2414bbb362cb090a2db616869ced16593f68f8e28ed9b0747be5bc7c30aae8d36d0436f3bbf5cebf807

    • C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe

      Filesize

      1.1MB

      MD5

      18400a6db4000c6776de3a74f9569fc9

      SHA1

      902d038140502d776db62673ee28a68f2ab0bf63

      SHA256

      ce924608d3184bd96670d0b1c87b3b9dd1898cd00548f5c64eb09dbd36e708b4

      SHA512

      172d17fb9d4913b54c41d07958623fb292f39721165138d03d7462325cb294686cf7b163304cb47a4098361b102a475a578fabb77c4cd73b3b4bf61c34dd96d7

    • C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe

      Filesize

      1.1MB

      MD5

      18400a6db4000c6776de3a74f9569fc9

      SHA1

      902d038140502d776db62673ee28a68f2ab0bf63

      SHA256

      ce924608d3184bd96670d0b1c87b3b9dd1898cd00548f5c64eb09dbd36e708b4

      SHA512

      172d17fb9d4913b54c41d07958623fb292f39721165138d03d7462325cb294686cf7b163304cb47a4098361b102a475a578fabb77c4cd73b3b4bf61c34dd96d7

    • C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe

      Filesize

      1.1MB

      MD5

      18400a6db4000c6776de3a74f9569fc9

      SHA1

      902d038140502d776db62673ee28a68f2ab0bf63

      SHA256

      ce924608d3184bd96670d0b1c87b3b9dd1898cd00548f5c64eb09dbd36e708b4

      SHA512

      172d17fb9d4913b54c41d07958623fb292f39721165138d03d7462325cb294686cf7b163304cb47a4098361b102a475a578fabb77c4cd73b3b4bf61c34dd96d7

    • C:\Users\Admin\AppData\Local\Temp\Cab537F.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar53D0.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Roaming\updatebgv5\ASUS_WMI.dll

      Filesize

      224KB

      MD5

      3f109a02c8d642e8003a1188df40d861

      SHA1

      f723f38471b8872443aa9177eef12a96c02cc84a

      SHA256

      6523b44da6fa7078c7795b7705498e487b0625e28e15aec2d270c6e4a909b5a5

      SHA512

      023696a52d48c465ab62e3ee754b445093b8a0ed0a232b430ce1f0db3dae382c9e1fba210c2b04d1018cc29bfb69c546976912f3939a76e98bcb792ae57af0da

    • C:\Users\Admin\AppData\Roaming\updatebgv5\ATKEX.dll

      Filesize

      84KB

      MD5

      e68562f63265e1a70881446b4b9dc455

      SHA1

      da16ef9367bde3ce892b1a0e33bc179d8acdceb3

      SHA256

      c8b16f1c6883a23021da37d9116a757f971fe919d64ef8f9dba17a7d8dd39adb

      SHA512

      6bedea10a5b50f6e93e8566c18970c8ad1b8dfc7d5961069fc5d5216dcdded0b2a2ad8dd91f4ad80f8604d573a343c126df238ee5c448cdc26b899077957a674

    • C:\Users\Admin\AppData\Roaming\updatebgv5\AsIO.dll

      Filesize

      120KB

      MD5

      46e6a0c97132a518620763caff0da368

      SHA1

      e39db0fb68e2df5a2d068c9c29f1e0c464aa66f2

      SHA256

      08cb42002f6b659182088f9756483627d0b4ebb9ed32eca89239ee626d1c1ce4

      SHA512

      117b8a042cd0004ece1b64c0222956c5e6f54c409e394dbbf72b293374d1abcb222a789067626cce3dc198ad8a3a70e2b73fab7dec71c82341970377fca80066

    • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

      Filesize

      446KB

      MD5

      485008b43f0edceba0e0d3ca04bc1c1a

      SHA1

      55ae8f105af415bb763d1b87f6572f078052877c

      SHA256

      12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

      SHA512

      402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

    • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

      Filesize

      446KB

      MD5

      485008b43f0edceba0e0d3ca04bc1c1a

      SHA1

      55ae8f105af415bb763d1b87f6572f078052877c

      SHA256

      12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

      SHA512

      402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

    • C:\Users\Admin\AppData\Roaming\updatebgv5\resort.dbf

      Filesize

      923KB

      MD5

      0192bf28a80e86fdd32aeb6e7aeacb53

      SHA1

      5dcbe85578c66dffaa282301b073d4a6543b6c03

      SHA256

      a406ab43597e21e1281adf134da4a5309f718361f90541824e5f0b2e99a2f3bf

      SHA512

      24e6c972676c88f510432c54159143af3e489816336425645250138e98b6ca242cc3d43da87997d515ae640e5ef3c237600572b99a058df11efce1fec219ea0c

    • \Users\Admin\AppData\Local\Temp\Browserchannel_test.exe

      Filesize

      1.1MB

      MD5

      18400a6db4000c6776de3a74f9569fc9

      SHA1

      902d038140502d776db62673ee28a68f2ab0bf63

      SHA256

      ce924608d3184bd96670d0b1c87b3b9dd1898cd00548f5c64eb09dbd36e708b4

      SHA512

      172d17fb9d4913b54c41d07958623fb292f39721165138d03d7462325cb294686cf7b163304cb47a4098361b102a475a578fabb77c4cd73b3b4bf61c34dd96d7

    • \Users\Admin\AppData\Roaming\updatebgv5\ASUS_WMI.dll

      Filesize

      224KB

      MD5

      3f109a02c8d642e8003a1188df40d861

      SHA1

      f723f38471b8872443aa9177eef12a96c02cc84a

      SHA256

      6523b44da6fa7078c7795b7705498e487b0625e28e15aec2d270c6e4a909b5a5

      SHA512

      023696a52d48c465ab62e3ee754b445093b8a0ed0a232b430ce1f0db3dae382c9e1fba210c2b04d1018cc29bfb69c546976912f3939a76e98bcb792ae57af0da

    • \Users\Admin\AppData\Roaming\updatebgv5\ATKEX.dll

      Filesize

      84KB

      MD5

      e68562f63265e1a70881446b4b9dc455

      SHA1

      da16ef9367bde3ce892b1a0e33bc179d8acdceb3

      SHA256

      c8b16f1c6883a23021da37d9116a757f971fe919d64ef8f9dba17a7d8dd39adb

      SHA512

      6bedea10a5b50f6e93e8566c18970c8ad1b8dfc7d5961069fc5d5216dcdded0b2a2ad8dd91f4ad80f8604d573a343c126df238ee5c448cdc26b899077957a674

    • \Users\Admin\AppData\Roaming\updatebgv5\AsIO.dll

      Filesize

      120KB

      MD5

      46e6a0c97132a518620763caff0da368

      SHA1

      e39db0fb68e2df5a2d068c9c29f1e0c464aa66f2

      SHA256

      08cb42002f6b659182088f9756483627d0b4ebb9ed32eca89239ee626d1c1ce4

      SHA512

      117b8a042cd0004ece1b64c0222956c5e6f54c409e394dbbf72b293374d1abcb222a789067626cce3dc198ad8a3a70e2b73fab7dec71c82341970377fca80066

    • \Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

      Filesize

      446KB

      MD5

      485008b43f0edceba0e0d3ca04bc1c1a

      SHA1

      55ae8f105af415bb763d1b87f6572f078052877c

      SHA256

      12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

      SHA512

      402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

    • memory/2380-205-0x0000000077990000-0x0000000077B39000-memory.dmp

      Filesize

      1.7MB

    • memory/2380-206-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-219-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-218-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-217-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-215-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-213-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-212-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-211-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-210-0x00000000000C0000-0x0000000000143000-memory.dmp

      Filesize

      524KB

    • memory/2380-209-0x00000000003F0000-0x0000000000671000-memory.dmp

      Filesize

      2.5MB

    • memory/2456-152-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2456-154-0x0000000077990000-0x0000000077B39000-memory.dmp

      Filesize

      1.7MB

    • memory/2456-201-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2456-204-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2456-202-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-150-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-148-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-147-0x0000000077990000-0x0000000077B39000-memory.dmp

      Filesize

      1.7MB

    • memory/2700-146-0x0000000074FC0000-0x0000000075134000-memory.dmp

      Filesize

      1.5MB

    • memory/2772-125-0x000007FEF70F0000-0x000007FEF7248000-memory.dmp

      Filesize

      1.3MB

    • memory/2772-123-0x000007FEF70F0000-0x000007FEF7248000-memory.dmp

      Filesize

      1.3MB

    • memory/2772-126-0x000007FEF70F0000-0x000007FEF7248000-memory.dmp

      Filesize

      1.3MB

    • memory/2772-139-0x000007FEF70F0000-0x000007FEF7248000-memory.dmp

      Filesize

      1.3MB

    • memory/2772-85-0x000000013F3D0000-0x000000013F4FB000-memory.dmp

      Filesize

      1.2MB

    • memory/2772-149-0x000007FEF70F0000-0x000007FEF7248000-memory.dmp

      Filesize

      1.3MB