Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 13:41

General

  • Target

    ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe

  • Size

    483KB

  • MD5

    5e5c4d53d4c51e067287b3b2c5a0ccb5

  • SHA1

    cd2a82ebb5e573cd01c0b708a249401d35b9424d

  • SHA256

    c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3

  • SHA512

    b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999

  • SSDEEP

    6144:XGC7W7BUJEflHwJVUesOjc3kv9MNfvfUuAhbLCrJHvg+JEVV8nU/uwtzSEdyS+tZ:Na7rNQJJpjcgyfvfUPs2PD4EdaMAboDQ

Malware Config

Extracted

Family

remcos

Botnet

2024

C2

72.11.158.94:1604

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    vexplorers.exe

  • copy_folder

    vexplorers

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-800RNZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER#4510093083_PO_NEW_MATERIAL_JAN_20242.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\ProgramData\vexplorers\vexplorers.exe
        "C:\ProgramData\vexplorers\vexplorers.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\ProgramData\vexplorers\vexplorers.exe
          "C:\ProgramData\vexplorers\vexplorers.exe"
          4⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
              PID:1008
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\szxyhvcwdjanlpqvgletlnlzp"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4796
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\ifkogcsupbibjjurwarria"
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook accounts
              PID:4668
            • C:\ProgramData\vexplorers\vexplorers.exe
              C:\ProgramData\vexplorers\vexplorers.exe /stext "C:\Users\Admin\AppData\Local\Temp\fdevfkhbtsqwyvgnfqw"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1316
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              5⤵
                PID:4008
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 1480
                5⤵
                • Program crash
                PID:3392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 436 -ip 436
        1⤵
          PID:4392

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          210KB

          MD5

          fbcf1264abb14899ea70d999cd3e32f0

          SHA1

          e0a10357623241e5aac34844fd38223888491b2e

          SHA256

          7a2eb97556f5adb7199a01cef1218c43f0e143f808c62fe07ac646f696406464

          SHA512

          a9dfc131159400779824f4474f46eae7e5027c852d7de667532f87fc9c6099752e4e0bbb87f2bc3306d3ab1c7d60a322598781e51417fa61bbe44d62dc4fa4ff

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          344KB

          MD5

          28f8558ec1c6562bc93d55d3e44270bf

          SHA1

          ea17b5d1240c9e8407e2df5d252c6ccc9b928d2a

          SHA256

          3448ab1688d9f784e1bd878605f353afd3ee961f8e686e0fe7e79b8e595750a2

          SHA512

          02ca87e54bca9411a3afb910a48983dc3e7a8652c38c496d8119f5daa9cfb4c60188d5b898a66a3c34f4db835eb2cc411683d9e42a62a908a4c492df2e6626a1

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          236KB

          MD5

          7d8be801f1cc51d2860dad1878585c06

          SHA1

          6c8989c7e11ddfb71bee7fed88a41ddffd8ecedb

          SHA256

          52023f61229df9425953f8dd921f4195b7f7877e26c8ce7ca75530c1f256ec15

          SHA512

          6722781c308fb18c7bd5e210bdf876f5c8236871c72cf75d51f59121b1f0f8155624bc701030cf4ec9c55e0dafca2ed1d0ea21aff4bf2e397ce377380debfeb9

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          483KB

          MD5

          5e5c4d53d4c51e067287b3b2c5a0ccb5

          SHA1

          cd2a82ebb5e573cd01c0b708a249401d35b9424d

          SHA256

          c6190f275806fbc359dfb1ce50790b29355215fa3b9671ea5a81ac35293b9de3

          SHA512

          b5d32d5ee4fb3503278bf367f42c962887db26202640e86ef2fa0ccf8cf95f0fd10c65ecb294b51d96616d12e09c601b561d7da55bf42e73d094cb8af08a5999

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          137KB

          MD5

          b60263cf50a22e5ccbdfe7790cc9e87b

          SHA1

          b5fbf97ab3345d6daa03c6230d59382faedc2563

          SHA256

          f957e5d2b9bb90b01b22600c6458334fa4a05c32245fd47e3d2fddee77eebb0c

          SHA512

          9c2bb7ca53f2e1b4862b07ee0e820cd361078d16fbc0d790520e2ea6fa1568c9d6940e5948d4fa28e1b38e9768a3939664af1dbe144879472ded6161569b18bd

        • C:\ProgramData\vexplorers\vexplorers.exe
          Filesize

          64KB

          MD5

          7f0d2fdb8e7c6c7e3d45fc8a68464614

          SHA1

          a84b1a28ca23a5a1907278ac199aabfdf5c0e67d

          SHA256

          ee401ab6e70b0c8bb6d01a7bd80f6d9e5486cad68d9922f9ba70b8d91bdef5a9

          SHA512

          7bf346e36f51580a256730cce5417b593e5331ed356dccb1ad3411752738c44ad792bcb2d2b670bee8cad1c86b9a2503485ba9386f9617b4bd9ec280a4ee136b

        • C:\Users\Admin\AppData\Local\Temp\fdevfkhbtsqwyvgnfqw
          Filesize

          4KB

          MD5

          2cbe8873d9d19e766fd9a1f758da8e74

          SHA1

          544271b8bf2aa7108e9f0f1cf11de5eb2a389f17

          SHA256

          b92f48c215f2d309a748e67787283bb2c61bbce1faf7dcb3b917f57be92b28e2

          SHA512

          4f8842cfc7b97b82e5f105aeb1b838f9f50072d3f9cae7412e09c0f8fb592a40fc6064cd9ef8e67133ec5694590d106d3e3141e2fd0a21c3d32d6340068ca632

        • C:\Users\Admin\AppData\Local\Temp\nss4027.tmp\System.dll
          Filesize

          11KB

          MD5

          3e6bf00b3ac976122f982ae2aadb1c51

          SHA1

          caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

          SHA256

          4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

          SHA512

          1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

        • C:\Users\Admin\AppData\Roaming\Nonconsolable\Spirituosa.exe
          Filesize

          207KB

          MD5

          2d7636a12edb15379c3365c60bb77e62

          SHA1

          1356ebc12504361cd8e3cedccc31a0ad051a9fb0

          SHA256

          d0261b60bfb51d4922b27d20e9478a115b71efbbfdcd690494e632941496e460

          SHA512

          b4613727b9c6680d9589e094acf8658dcc25c98ffc6aaa7d62c5e0f615ba980176eb7c04ebfe5b1454e8d8770d3fb857f0bdf1e1c14e81daddfa0f9e68d7f456

        • C:\Users\Admin\yawlsman\knowhow\Koftekldte\Gnomonologically\Septicemic.San
          Filesize

          123KB

          MD5

          2029bb3ad654c4a71ecded3f54707b15

          SHA1

          27e88bf942a286115f692bca617a7a2bde656d21

          SHA256

          02515337f82ebc34325ce5e690658d7c894b0a3abf6a57c47c5132fd40be0aa4

          SHA512

          ba7b52d90cd77a1c6ca48d4e80bc9c81749370bdd528c721ba9bca4ae5ef2f8481005929497fc9da22d7e29be3d168d193dd1ed571e945aff9c7e4fcb64a873a

        • memory/436-101-0x0000000036090000-0x00000000360A9000-memory.dmp
          Filesize

          100KB

        • memory/436-55-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/436-54-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/436-98-0x0000000036090000-0x00000000360A9000-memory.dmp
          Filesize

          100KB

        • memory/436-102-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/528-50-0x0000000010000000-0x0000000010006000-memory.dmp
          Filesize

          24KB

        • memory/1008-62-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1008-59-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1008-61-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1008-90-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/1316-79-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/1316-95-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/1316-64-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/1316-70-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/1316-74-0x0000000000400000-0x0000000000478000-memory.dmp
          Filesize

          480KB

        • memory/2792-16-0x0000000077AE1000-0x0000000077C01000-memory.dmp
          Filesize

          1.1MB

        • memory/2792-17-0x0000000010000000-0x0000000010006000-memory.dmp
          Filesize

          24KB

        • memory/3380-22-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/3380-39-0x0000000077AE1000-0x0000000077C01000-memory.dmp
          Filesize

          1.1MB

        • memory/3380-38-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/3380-21-0x00000000004A0000-0x00000000016F4000-memory.dmp
          Filesize

          18.3MB

        • memory/3380-26-0x0000000077AE1000-0x0000000077C01000-memory.dmp
          Filesize

          1.1MB

        • memory/3380-18-0x0000000077B68000-0x0000000077B69000-memory.dmp
          Filesize

          4KB

        • memory/3380-19-0x0000000077AE1000-0x0000000077C01000-memory.dmp
          Filesize

          1.1MB

        • memory/4008-103-0x0000000000400000-0x000000000049B000-memory.dmp
          Filesize

          620KB

        • memory/4668-80-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/4668-66-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/4668-73-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/4668-78-0x0000000000400000-0x0000000000457000-memory.dmp
          Filesize

          348KB

        • memory/4796-71-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/4796-88-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/4796-84-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB

        • memory/4796-86-0x0000000000400000-0x0000000000424000-memory.dmp
          Filesize

          144KB