Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/01/2024, 19:24

General

  • Target

    ballsack e.exe

  • Size

    36KB

  • MD5

    644f18453d3e3874b8cd64374dcebc9e

  • SHA1

    0118997f0114b4a1f090f35d6321d43fe036951a

  • SHA256

    42013a222c8b3840f8242c0664f46fa3776b9e1cddae157fd208d15ba2c49055

  • SHA512

    81bb87a9295587999d9b2661a92615a235084d44dedbf726f7fffc3db693d42847e85ca9cf4420297214120703e291bef29be9f3b057f9851acaf45f0e32b31e

  • SSDEEP

    768:PNnmZ/8vPlLUdhfJ8v6utFpVsuRregrWChgzub7Dsr1:Fnwu4DejVLyOhgzuYr

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

shall-someone.gl.at.ply.gg:60408

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    jeava.exe

  • copy_folder

    jdk683623

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vindevs

  • keylog_path

    %AppData%

  • mouse_option

    true

  • mutex

    remcos_kixjmsbwpikjkoa

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    60

  • startup_value

    Dlscord

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ballsack e.exe
    "C:\Users\Admin\AppData\Local\Temp\ballsack e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\SysWOW64\cmd.exe
      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:248
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • Modifies registry key
        PID:948
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Windows\SysWOW64\PING.EXE
        PING 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:4780
      • C:\Windows\SysWOW64\jdk683623\jeava.exe
        "C:\Windows\SysWOW64\jdk683623\jeava.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies WinLogon
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\SysWOW64\cmd.exe
          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\reg.exe
            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • UAC bypass
            • Modifies registry key
            PID:4848
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
            PID:2056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.bat

      Filesize

      90B

      MD5

      d261161d84c1119ba526b75df8123299

      SHA1

      8e11e70f6d31c781f389f892c8330b61bd1ff370

      SHA256

      a3e8bb0a185943fd76d014d2ed0d2dcc33153fbb87bb952304674feaeaeb22a5

      SHA512

      ff9b8b5d21460a245574425d95d9e9a6b2c2350b313e8108bf5c8f66519eca5f2160e52ee49b6460a69b6fdccc9f926c2cd9e967ba0a40f490a9aed69cc5d351

    • C:\Windows\SysWOW64\jdk683623\jeava.exe

      Filesize

      36KB

      MD5

      644f18453d3e3874b8cd64374dcebc9e

      SHA1

      0118997f0114b4a1f090f35d6321d43fe036951a

      SHA256

      42013a222c8b3840f8242c0664f46fa3776b9e1cddae157fd208d15ba2c49055

      SHA512

      81bb87a9295587999d9b2661a92615a235084d44dedbf726f7fffc3db693d42847e85ca9cf4420297214120703e291bef29be9f3b057f9851acaf45f0e32b31e

    • memory/1736-12-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2568-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2568-6-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB