Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 14:56

General

  • Target

    a4b8aa74ad2cbd0637fde253fe274e83.exe

  • Size

    1.3MB

  • MD5

    a4b8aa74ad2cbd0637fde253fe274e83

  • SHA1

    33fcb9720d1995b44b04851ef407e6ad0e50a268

  • SHA256

    20a6b7999fb3ff90688026a1c27ba38b36a2b164f949fc340373832388abf727

  • SHA512

    82ee46fc2122fae3d168e06f0fdb39090135d6a5464072fa7ba74799a2bd18a98eb68f7e1b34b23f46641322e930e10f5cde38a956672f3d0f1ee09e17c181d3

  • SSDEEP

    24576:BAHnh+eWsN3skA4RV1Hom2KXMmHadTm8wSntzVmaziyUqtkRzUhUzLqtkg5:Yh+ZkldoPK8YadHw812BjRzUhwLqtT

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

107.175.229.139:8087

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    yes.png

  • keylog_flag

    false

  • keylog_folder

    aka

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    jhudguiytgu-AAHEXC

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe
    "C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\a4b8aa74ad2cbd0637fde253fe274e83.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4824
      • C:\Users\Admin\AppData\Local\directory\name.exe
        C:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\deyvhradngjjnjushnaxrblmowwmdwjgn"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4132
      • C:\Users\Admin\AppData\Local\directory\name.exe
        C:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\fgdgi"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook accounts
        PID:3404
      • C:\Users\Admin\AppData\Local\directory\name.exe
        C:\Users\Admin\AppData\Local\directory\name.exe /stext "C:\Users\Admin\AppData\Local\Temp\qajzacezp"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\deyvhradngjjnjushnaxrblmowwmdwjgn

    Filesize

    4KB

    MD5

    fdaa8866c905accc6ed1cb0f204b0f2c

    SHA1

    cf3a1f2d3841e3d52f3875df2bc1ff667ba8c774

    SHA256

    96db24a652541fb09e22d3dc23495c0475a4dbd2bd2dd6bb4d2aa98b1ae591ad

    SHA512

    02fae866918ca0250be91c2b85baf1a65d5cb295e6f995f0814c0a20ad1192a78f44b8a456bf1b52c9e202d523e7685157cbd2930bec483481463b7926309f2f

  • C:\Users\Admin\AppData\Local\Temp\underbalanced

    Filesize

    29KB

    MD5

    6095b3a6322d084d755577894297de0f

    SHA1

    b8c97c4350364e2157376b90f0b66a40e9bfbbea

    SHA256

    bfd80df7b9ce9e3299227cbb03fa95142bed451d842b50a0523bcaa532ae7a06

    SHA512

    7700d0090e812b3c195246df71901c51383c810b962aafd94f006caa7e3353a83308fb905c3800488ed1300d4c7cd49602696f1871db9fa20bb7efe8d9940427

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    2.4MB

    MD5

    92be7bd812e3d1dbef1a35f9b3a24b84

    SHA1

    0b94f227f832e8f98a1e1aca7db721c945551281

    SHA256

    c22fad63b760a3223c66be5445096bdbef8e892a82d4e4e339f95b3167a3ae3e

    SHA512

    d0285ba2ed99bf4e0d790454303d18ca710eac1e7bfada9cdb4f323fc8326596ea115123a45b5287f84f9cac9373e55073eaaa54034221eb856527c67dc5fcef

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    2.8MB

    MD5

    38df23fb5a7b5503528422147e32fee1

    SHA1

    b610459e6cf42496543ccb99a76d5cf5d7804cbb

    SHA256

    c71fc5add23095cb8cd59d5e8904ceabcba45a2915da7381a06b6fea51bb7b5c

    SHA512

    06c015df97209972077822c33043793e1c378b7b241b05f30932d707baf2cfbf890e72a30a9c2c2cde910305647fe055e7cb6180c536ae7cfcf692ea55db9fe4

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    2.2MB

    MD5

    6f8de56d2037c8ad8084f3dfc35741eb

    SHA1

    8b7f81ed658a3730aa4e6fb10a4ee3c67f64471e

    SHA256

    b2270175eff35604d9267bd213ba72aff27bc2c534a647f172c91f508b675865

    SHA512

    04efe6c3033506a291b573200d03297721917a087f6a5a81c3caf9b9a08d987ee97ad1694d6998c20d30ab0a6ef21bb017bc7bd4f594762d6f57740bd8269142

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    2.5MB

    MD5

    7d3924e7f4e69e0d134eefac59e982ac

    SHA1

    6ac759af10077e4f9caa206848594336f00a15be

    SHA256

    a0bc5b0408958a0c356be56fc653642e7ab5b68688423c6b0e332becdb36a473

    SHA512

    920d8cd2c09a00adb472a4ae84be9a50573698cd81394a635e6813c7b615727005f4deeb823b921071068abb635be72c34bc3fc74488d825328ee3620b05b1c8

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    2.6MB

    MD5

    3dca99b930dce4d5fb1ecc3e64e77123

    SHA1

    0a56b07a43d774011e1be9901e73ed60d25b3c78

    SHA256

    c0b5876fc17699e8e648f84af3a70dcb28dcaec4586f3b612f681fe249824796

    SHA512

    6af2239144f1949728d6f3553bc5b96a39c2e6d4753d03edbfa2547e006b3814c4a46aecf7fbd054c180192ba928c6c447b9a2d99983b567cd5ba1906c10e737

  • C:\Users\Admin\AppData\Roaming\aka\yes.png

    Filesize

    144B

    MD5

    ab60012bdc08732d712b655c641e5a5c

    SHA1

    88d1fd4548fc3d37a0465e7f90abf8a0600ca90a

    SHA256

    10ee1b7ba14408c421130b3b589f185c2a8fca4a7e490283d5ffca0145bb4c94

    SHA512

    d4ca93c37a94f476e66e34a65de86aa931f9fb5a7a48d283243e6c12ad68a64d3b3aaa824a398ded3a707323a45762658fac93ae0aa738eabe6442e3f5c05cdc

  • memory/3360-55-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3360-62-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3360-51-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3360-63-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3404-48-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3404-60-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3404-56-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3404-43-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3404-54-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/4132-41-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4132-65-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4132-46-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4132-50-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4808-10-0x0000000000C70000-0x0000000000C74000-memory.dmp

    Filesize

    16KB

  • memory/4824-36-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-73-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-37-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-38-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-35-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-34-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-31-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-33-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-67-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4824-28-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-72-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4824-40-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-71-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4824-70-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4824-77-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-78-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-79-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-29-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-82-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4824-87-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-95-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-96-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-103-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4824-104-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB