Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2024 13:41

General

  • Target

    ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe

  • Size

    483KB

  • MD5

    5e5c4d53d4c51e067287b3b2c5a0ccb5

  • SHA1

    cd2a82ebb5e573cd01c0b708a249401d35b9424d

  • SHA256

    c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3

  • SHA512

    b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999

  • SSDEEP

    6144:XGC7W7BUJEflHwJVUesOjc3kv9MNfvfUuAhbLCrJHvg+JEVV8nU/uwtzSEdyS+tZ:Na7rNQJJpjcgyfvfUPs2PD4EdaMAboDQ

Malware Config

Extracted

Family

remcos

Botnet

2024

C2

72.11.158.94:1604

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    vexplorers.exe

  • copy_folder

    vexplorers

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-800RNZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\ProgramData\vexplorers\vexplorers.exe
        "C:\ProgramData\vexplorers\vexplorers.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\ProgramData\vexplorers\vexplorers.exe
          "C:\ProgramData\vexplorers\vexplorers.exe"
          4⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:1992
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              5⤵
                PID:956
              • C:\ProgramData\vexplorers\vexplorers.exe
                C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\dmpiljqcosgniwa"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2112
              • C:\ProgramData\vexplorers\vexplorers.exe
                C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\qjaleulxqiqxviknhhvtpj"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1188
              • C:\ProgramData\vexplorers\vexplorers.exe
                C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\gousdbbdcayskcwbpw"
                5⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook accounts
                PID:2108
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                5⤵
                  PID:1456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 928
                  5⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1956

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Discovery

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        1
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          341KB

          MD5

          5b85789f005543abaaab0bad25074cff

          SHA1

          8d8411d9e4e8c0f88acf1b4aa1921873ed38d37a

          SHA256

          5fa0ddff91b995158ad49e9b850f278a34754b005bc4e5e3f733446e750a79cd

          SHA512

          a9883bb3f21c5f65ad37d9d4934e2d9f5e7d354732d5b688d4fd7600c49885d4cfa41bb1449722f36c89241ee133df4edca0ece989628062a3808b712e5342ad

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          483KB

          MD5

          5e5c4d53d4c51e067287b3b2c5a0ccb5

          SHA1

          cd2a82ebb5e573cd01c0b708a249401d35b9424d

          SHA256

          c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3

          SHA512

          b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          333KB

          MD5

          8f2de4d66d5673df1cf29395ba6a0814

          SHA1

          684f9018a01d86ccee5a17aed611dad992a3b646

          SHA256

          04bea9aa249d615a34901db111cda7ae368e9dd3d89eec7e625050f16a56f97a

          SHA512

          a608cdcdce98296525e546d6f916e0469ea8610bc3419d19ac6a9997c6e5c4c99854017e05dea6f2606fdb254732f680cf9b9f05d4ea93a0bec1a1ededba31c0

        • C:\Users\Admin\AppData\Local\Temp\dmpiljqcosgniwa
          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Nonconsolable\Spirituosa.exe
          Filesize

          483KB

          MD5

          a7ec03cb53accf6dd62ac32f01160173

          SHA1

          1efdba6aba44dbd72fd48a115000c9fa6d542f47

          SHA256

          5d3e517cf5732d40c54fe03d4786ee08c14b29cb5751c4993e2d351e7490e901

          SHA512

          63fb1cfd5038c9051b0ad08d0f90a69c043aeb43b78596b5c733ef2112b44eb7c099f9b0e9daf52c3556a523a98466c223df94feeb5f64bd03f904c1590e2470

        • C:\Users\Admin\yawlsman\knowhow\Koftekldte\Gnomonologically\Septicemic.San
          Filesize

          245KB

          MD5

          ced89e164bfe18cae1aa190b4ae9178c

          SHA1

          94c44c548980a6092706a4ffb943592d9d1f325b

          SHA256

          1f2b3588330809595cb33273ed52c3d14299ca015eb8a70ccdc9ec4ad1ada7b2

          SHA512

          946cecce44eebcdd63f948992926d96f7863238312dc85d31bef7cb2bec31e21c95222d2852a06d0af515961a5164aabcf966ad283794bfa0da7eddb130df93c

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          417KB

          MD5

          5973d6c19487794dd99fc0e598870470

          SHA1

          e230291a7ac4fe41bd266e77dd110268769909af

          SHA256

          cf9cc86f4c24eb2cb7a0bac56e9581b069784c3adc7289a9540d290f37eebd11

          SHA512

          e1e1fd4bcd2f2fda6637825b34febbbe1b149ca0aa62b7a0db54c6ed0bba860785f51dcb626fb5264f724d0145c42a07fe0d1e23a58a7327655c58ea19a15a4c

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          165KB

          MD5

          7cfb44334562cf781ccb866ed04ef02c

          SHA1

          aff431c9f1a87d6fd2a0112aefcb6a63f157b72b

          SHA256

          80e4de5fa17429cfe5fa4c3ace67cb3d1e95f84f6a22964e898f9d5e8738b859

          SHA512

          1117fafc52b5dab76c712e54b26d0d514f449837c2697585a24b387f720376737a063d92d5ec83e2b4478cb96342a430ac9cc4f52a3e4e3be3e26da96e51a41f

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          180KB

          MD5

          387041c71f18830cc6bac750da872878

          SHA1

          fb28ffda75bbb7977b5e2fc108d0b89a78890cf9

          SHA256

          9ad1c970acdb13e20fcb5daa433befb8b94c3603a1cdcd5cc8e0e907ff6953d5

          SHA512

          4bce46099c6e5808de1398cbf230796359c2accffd75c65ee409aa9cb0169fb30d9d2f313f3b1face5ac365e20ba3e906e8e6d2765d59c80e3afca95782df496

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          317KB

          MD5

          3177d7bb21b26276fa3deb6dc7367072

          SHA1

          3f4046ae63872d3ad7052e07bb7baf1132b616ea

          SHA256

          bbe9fd6d83fb8af6791f3ad240c84d5fa21d7b6b828b9a5d761fb5f6448a6f8c

          SHA512

          3f589030260d1113672a3170dd321cc4e5f4aa68f07e6c07ed5e586ed2cde66e55213d366d41616f84204b1a815a9938f38fc5fec9d57afef866f1b878b4dca8

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          379KB

          MD5

          96094503da12619f11737b8cad017756

          SHA1

          de7505e4ddd49520a575a3cc22c483201d2c59db

          SHA256

          3d9089d4301f1f5e843fed5c3734029bec595e866a794789e9a82b1af2505858

          SHA512

          bd64c8ca506d12c6fd89f6291db1a98718b0ecc35b30d6b16b73caef343e22b2b60f33928edc29c7348a115257d108c3a5c5fe6a35fcd52be00e01c987eca7fa

        • \ProgramData\vexplorers\vexplorers.exe
          Filesize

          425KB

          MD5

          cabf1bc4be9b2b1dd4c1a06f22c9acb7

          SHA1

          38abb8c59edf5a95f5ffeeac87ea543a1ef8fff8

          SHA256

          d44135f212d304a60cd161862f22c67c6c336dc540e3ee4da83c418ea7d01e3f

          SHA512

          d3d83d071758f73253db1f8eebfbf8f8f865fc61b88beff08bf60f685d8d053446c8d1306102a63c2ff065daed2c1e8e96305fabf7910302e06f387ee2843050

        • \Users\Admin\AppData\Local\Temp\nso1A17.tmp\System.dll
          Filesize

          11KB

          MD5

          3e6bf00b3ac976122f982ae2aadb1c51

          SHA1

          caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

          SHA256

          4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

          SHA512

          1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

        • memory/956-72-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/956-71-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/956-67-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/956-100-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1188-90-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/1188-80-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/1188-86-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/1188-91-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/1456-118-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1456-101-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/1736-18-0x0000000010000000-0x0000000010006000-memory.dmp
          Filesize

          24KB

        • memory/1736-17-0x0000000077A40000-0x0000000077B16000-memory.dmp
          Filesize

          856KB

        • memory/1736-16-0x0000000077850000-0x00000000779F9000-memory.dmp
          Filesize

          1.7MB

        • memory/1992-64-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1992-63-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1992-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/1992-61-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1992-66-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/2108-75-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/2108-83-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/2108-115-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/2108-87-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/2112-73-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2112-88-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2112-79-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2112-97-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2112-82-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2208-40-0x0000000077A40000-0x0000000077B16000-memory.dmp
          Filesize

          856KB

        • memory/2208-19-0x0000000077850000-0x00000000779F9000-memory.dmp
          Filesize

          1.7MB

        • memory/2208-21-0x0000000077A40000-0x0000000077B16000-memory.dmp
          Filesize

          856KB

        • memory/2208-35-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/2208-23-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/2208-24-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/2208-28-0x0000000077A40000-0x0000000077B16000-memory.dmp
          Filesize

          856KB

        • memory/2208-20-0x0000000077A76000-0x0000000077A77000-memory.dmp
          Filesize

          4KB

        • memory/2568-49-0x0000000010000000-0x0000000010006000-memory.dmp
          Filesize

          24KB

        • memory/2568-48-0x0000000077850000-0x00000000779F9000-memory.dmp
          Filesize

          1.7MB

        • memory/3052-106-0x00000000345A0000-0x00000000345B9000-memory.dmp
          Filesize

          100KB

        • memory/3052-54-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/3052-51-0x0000000077850000-0x00000000779F9000-memory.dmp
          Filesize

          1.7MB

        • memory/3052-109-0x00000000345A0000-0x00000000345B9000-memory.dmp
          Filesize

          100KB

        • memory/3052-81-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/3052-117-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB

        • memory/3052-55-0x00000000004A0000-0x0000000001502000-memory.dmp
          Filesize

          16.4MB