Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 16:10

General

  • Target

    Reports_00029.exe

  • Size

    1.3MB

  • MD5

    f7871f5c7d07bdec96e812276f96f98d

  • SHA1

    8ae1174abd768b7ac56952d2779ef4b99afc65f4

  • SHA256

    1fb45a9a06fd027fdd78def47c4e036367b7ab1179a452a378f08b1092fc9fa5

  • SHA512

    df30bdcf53e69ff3a7c3a3bc507ecf3e29259b21a66d12ed176ccb88d3c50b56b87741f5671f7552b8370c0795ed08b8e27f64c1764f144a857efbef745c8bbd

  • SSDEEP

    24576:HGKwPWRuG1o6yf8301SaPY/6y3hBAzqBz8qC:HqWH300jg

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

omemma.duckdns.org:1941

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    hymgg

  • mouse_option

    false

  • mutex

    Rmc-OZ4Y1V

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Reports_00029.exe
    "C:\Users\Admin\AppData\Local\Temp\Reports_00029.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\TbmsortaO.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c mkdir "\\?\C:\Windows "
        3⤵
          PID:3980
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
          3⤵
            PID:3260
          • C:\Windows\SysWOW64\xcopy.exe
            xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
            3⤵
            • Enumerates system info in registry
            PID:4408
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
            3⤵
              PID:1392
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
              3⤵
              • Enumerates system info in registry
              PID:3640
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
              3⤵
              • Enumerates system info in registry
              PID:2988
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
              3⤵
                PID:2548
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                3⤵
                  PID:3056
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y
                  3⤵
                  • Enumerates system info in registry
                  PID:4508
                • C:\Windows \System32\easinvoker.exe
                  "C:\\Windows \\System32\\easinvoker.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1432
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3616
                    • C:\Windows\system32\cmd.exe
                      cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4244
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                        6⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1108
                    • C:\Windows\system32\sc.exe
                      sc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel
                      5⤵
                      • Launches sc.exe
                      PID:704
                    • C:\Windows\system32\sc.exe
                      sc.exe start truesight
                      5⤵
                      • Launches sc.exe
                      PID:4208
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "C:\\Windows \\System32\\easinvoker.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4660
                • C:\Windows \System32\easinvoker.exe
                  "C:\\Windows \\System32\\easinvoker.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:4220
              • C:\Windows\SysWOW64\colorcpl.exe
                C:\Windows\System32\colorcpl.exe
                2⤵
                • Suspicious use of SetWindowsHookEx
                PID:4348

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\hymgg\logs.dat

              Filesize

              144B

              MD5

              9040f7f734a05a32f2073d212c3542b1

              SHA1

              36599f639e67b3adb48b6f4d3e50ad96d31ec24a

              SHA256

              9ebcc8970953712636c54fc88f6a5c6ebb9f25f099cbe6f4f22e6f428f50e254

              SHA512

              c08c24aa3fc3719bb2e07d2344f75b92ab6977493819c6cddcc8e7d76be2d939eda4d8887ae53af3ea06a4a11818e86b568ba003079eedabec175401da7200fe

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z44qt2nc.ino.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Public\Libraries\KDECO.bat

              Filesize

              4KB

              MD5

              785e8193007bcd7858b9df41c9d45f89

              SHA1

              29b206de05ab075138ca9e0b9fccdddf3c30cdfe

              SHA256

              c8e1912a3328802e98563e32eb053ae3e28249b701054af227e9f1ba6bfe24d9

              SHA512

              a4d6fd586800f27939d8c152e89d2a231dc9fd8466e715dfeba22e2aa0428509095e12e6e66f2cb5e40ff5c998b439dc3f6792e20c179f41ac9cae31ada9d45f

            • C:\Users\Public\Libraries\TbmsortaO.bat

              Filesize

              7KB

              MD5

              0d0d24b46d4bb0e4962595d455020d48

              SHA1

              48b247c1cb2577b28aabd7dfa999e0642b5dc6de

              SHA256

              f46e0cc2c119a32dd87edf97bfc73d985ee97d2c9dc00274b6b20d641e29deea

              SHA512

              d5a8779e1cfd2a284173ce8a205cacb41fc7c744fa84e55682ac50b327c676ff50f668ecd176e0ab84420d143a8023d8b4590362b223704c55f5b0d7e116ba2c

            • C:\Users\Public\Libraries\easinvoker.exe

              Filesize

              128KB

              MD5

              231ce1e1d7d98b44371ffff407d68b59

              SHA1

              25510d0f6353dbf0c9f72fc880de7585e34b28ff

              SHA256

              30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

              SHA512

              520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

            • C:\Users\Public\Libraries\netutils.dll

              Filesize

              115KB

              MD5

              7b204fe717f1d0e74986ce551d86e0b3

              SHA1

              f895f27eabb834ab8947a6f6f4dd3a1e38a32c54

              SHA256

              4b186952d56dddacaf1738c1b268a62acb12cbf472fbf1a6083a49be0f9ef03d

              SHA512

              9e9c88b0501708d501242aa4944de6e0d8481196babfb8444ad426b58326ad5bb46e43c372069b96784560db55e3fc04a264fbd701e7ec0535ac2816a65e83ec

            • memory/1108-41-0x00007FF857160000-0x00007FF857C21000-memory.dmp

              Filesize

              10.8MB

            • memory/1108-38-0x000001EEB7560000-0x000001EEB7570000-memory.dmp

              Filesize

              64KB

            • memory/1108-37-0x00007FF857160000-0x00007FF857C21000-memory.dmp

              Filesize

              10.8MB

            • memory/1108-36-0x000001EEB96E0000-0x000001EEB9702000-memory.dmp

              Filesize

              136KB

            • memory/1432-26-0x00000000613C0000-0x00000000613E3000-memory.dmp

              Filesize

              140KB

            • memory/1604-0-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/1604-1-0x00000000029B0000-0x00000000039B0000-memory.dmp

              Filesize

              16.0MB

            • memory/1604-2-0x00000000029B0000-0x00000000039B0000-memory.dmp

              Filesize

              16.0MB

            • memory/1604-4-0x0000000000400000-0x000000000054C000-memory.dmp

              Filesize

              1.3MB

            • memory/1604-48-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/4220-46-0x00000000613C0000-0x00000000613E3000-memory.dmp

              Filesize

              140KB

            • memory/4348-74-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-86-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-54-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-56-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-57-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-59-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-60-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-62-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-63-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-64-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-66-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-67-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-52-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-69-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-70-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-71-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-73-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-49-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-76-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-77-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-79-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-80-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-82-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-83-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-85-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-53-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-88-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-89-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-90-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-92-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-93-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-95-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-96-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-98-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-99-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-101-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-102-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-103-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-105-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-106-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-109-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-110-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-112-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-113-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-115-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-117-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-118-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-120-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-121-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-123-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-126-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB

            • memory/4348-127-0x0000000000AA0000-0x0000000001AA0000-memory.dmp

              Filesize

              16.0MB