Resubmissions

01/03/2024, 15:31

240301-syf2vahd64 10

20/02/2024, 16:00

240220-tfmmcaba5s 10

Analysis

  • max time kernel
    1486s
  • max time network
    1500s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/03/2024, 15:31

General

  • Target

    Swift 19022024.bat

  • Size

    2.2MB

  • MD5

    6dc5aa35800875f5e06a20da26286f13

  • SHA1

    b9fbf17b8a2aeae452050b2f660ef8cff024a433

  • SHA256

    db5c362b0b4ec0a9bbc7b2c5a186a22019c82c2a96a7c326fad2e1f095de22db

  • SHA512

    a51120e0800a2694ae14267faf667dc5f37be76bf17bcc042931ef8a1f7f8b38237bf12f441ce3eec7eb4aba15428e3ddcbaa2f23a2944b7f8adbe9c9a5649ab

  • SSDEEP

    24576:RLM2LFX2P6Qv1hhxfAswo1eoKHMX+mIi8g1CLbGBi3oucj+9OtOT+a0sloBJCpDo:RYQSv1fxfAsJ1eoVuSDW0YXEx

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

swjurf.work.gd:9231

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    hgjbhk

  • mouse_option

    false

  • mutex

    Rmc-BM92FA

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Swift 19022024.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\system32\cmd.exe
      cmd /c certutil -decodehex "C:\Users\Admin\AppData\Local\Temp\Swift 19022024.bat" "C:\Users\Public\pointer.com" 3
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Windows\system32\certutil.exe
        certutil -decodehex "C:\Users\Admin\AppData\Local\Temp\Swift 19022024.bat" "C:\Users\Public\pointer.com" 3
        3⤵
          PID:4828
      • C:\Windows\system32\PING.EXE
        PING -n 3 127.0.0.1
        2⤵
        • Runs ping.exe
        PID:3548
      • C:\Users\Public\pointer.com
        C:\Users\Public\pointer.com
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\SoxqluztO.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3700
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c mkdir "\\?\C:\Windows "
            4⤵
              PID:2740
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
              4⤵
                PID:660
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
                4⤵
                • Enumerates system info in registry
                PID:4356
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                4⤵
                  PID:5020
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
                  4⤵
                  • Enumerates system info in registry
                  PID:1716
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                  4⤵
                    PID:1392
                  • C:\Windows\SysWOW64\xcopy.exe
                    xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
                    4⤵
                    • Enumerates system info in registry
                    PID:2360
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                    4⤵
                      PID:1404
                    • C:\Windows\SysWOW64\xcopy.exe
                      xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y
                      4⤵
                      • Enumerates system info in registry
                      PID:2968
                    • C:\Windows \System32\easinvoker.exe
                      "C:\\Windows \\System32\\easinvoker.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1388
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5004
                        • C:\Windows\system32\cmd.exe
                          cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2320
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                            7⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1836
                        • C:\Windows\system32\sc.exe
                          sc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel
                          6⤵
                          • Launches sc.exe
                          PID:3328
                        • C:\Windows\system32\sc.exe
                          sc.exe start truesight
                          6⤵
                          • Launches sc.exe
                          PID:3424
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c "C:\\Windows \\System32\\easinvoker.exe"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2084
                    • C:\Windows \System32\easinvoker.exe
                      "C:\\Windows \\System32\\easinvoker.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:244
                  • C:\Windows\SysWOW64\colorcpl.exe
                    C:\Windows\System32\colorcpl.exe
                    3⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4440
                    • C:\Windows\SysWOW64\colorcpl.exe
                      C:\Windows\SysWOW64\colorcpl.exe /stext "C:\Users\Admin\AppData\Local\Temp\ddyzt"
                      4⤵
                        PID:2668
                      • C:\Windows\SysWOW64\colorcpl.exe
                        C:\Windows\SysWOW64\colorcpl.exe /stext "C:\Users\Admin\AppData\Local\Temp\nylrmbai"
                        4⤵
                        • Accesses Microsoft Outlook accounts
                        PID:2160
                      • C:\Windows\SysWOW64\colorcpl.exe
                        C:\Windows\SysWOW64\colorcpl.exe /stext "C:\Users\Admin\AppData\Local\Temp\qaqcnutkqtt"
                        4⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3136
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1728
                        4⤵
                        • Program crash
                        PID:2872
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\RegisterUnlock.vbe"
                  1⤵
                    PID:2044
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4440 -ip 4440
                    1⤵
                      PID:4456

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\hgjbhk\logs.dat

                      Filesize

                      428B

                      MD5

                      b361e668932de2cd060286e4c1680f3c

                      SHA1

                      952cf3a412843d88e54d9feefa4aa600408cb9f6

                      SHA256

                      d4b4f0eb7a954af382e933e04a7497ed47a3ff3ea71868c738399a78ac3b16be

                      SHA512

                      21206570981879b5502f607209e4c9749edfb9c34f9814bfdd3293fd0ce9ae2d72519a6c4601f15e27f2891f7ca3b6163f95cb8343c91a5b4d56894b58b9e669

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yagksvdq.s4w.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\ddyzt

                      Filesize

                      2B

                      MD5

                      f3b25701fe362ec84616a93a45ce9998

                      SHA1

                      d62636d8caec13f04e28442a0a6fa1afeb024bbb

                      SHA256

                      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                      SHA512

                      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                    • C:\Users\Public\Libraries\KDECO.bat

                      Filesize

                      4KB

                      MD5

                      785e8193007bcd7858b9df41c9d45f89

                      SHA1

                      29b206de05ab075138ca9e0b9fccdddf3c30cdfe

                      SHA256

                      c8e1912a3328802e98563e32eb053ae3e28249b701054af227e9f1ba6bfe24d9

                      SHA512

                      a4d6fd586800f27939d8c152e89d2a231dc9fd8466e715dfeba22e2aa0428509095e12e6e66f2cb5e40ff5c998b439dc3f6792e20c179f41ac9cae31ada9d45f

                    • C:\Users\Public\Libraries\SoxqluztO.bat

                      Filesize

                      7KB

                      MD5

                      0d0d24b46d4bb0e4962595d455020d48

                      SHA1

                      48b247c1cb2577b28aabd7dfa999e0642b5dc6de

                      SHA256

                      f46e0cc2c119a32dd87edf97bfc73d985ee97d2c9dc00274b6b20d641e29deea

                      SHA512

                      d5a8779e1cfd2a284173ce8a205cacb41fc7c744fa84e55682ac50b327c676ff50f668ecd176e0ab84420d143a8023d8b4590362b223704c55f5b0d7e116ba2c

                    • C:\Users\Public\Libraries\easinvoker.exe

                      Filesize

                      128KB

                      MD5

                      231ce1e1d7d98b44371ffff407d68b59

                      SHA1

                      25510d0f6353dbf0c9f72fc880de7585e34b28ff

                      SHA256

                      30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                      SHA512

                      520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                    • C:\Users\Public\Libraries\netutils.dll

                      Filesize

                      115KB

                      MD5

                      ecb0b0d16112f27c57e4048a02802fd5

                      SHA1

                      f7d1c76802d3948c55114fc0ea82c928936de944

                      SHA256

                      ae33f291a6f2011ca147c2b48035743aba3c507dcef86e1fa6acb4dee47cbf43

                      SHA512

                      a18a6cde621274f42e20b4b897df2df984a8e6d420d65198fd6d4193a3a91b8c3ca6905120ac299acd8758da72654e7a650e872425677763894b11c98f03c421

                    • C:\Users\Public\pointer.com

                      Filesize

                      1.3MB

                      MD5

                      5e14df714a090c430526a6a3f5ae14a9

                      SHA1

                      9d30febbb7666626c8c3a917aeccdda79d39f18a

                      SHA256

                      699a27d39fd0baa6dee651adf1995ca6eb168657b41235fd0d2cd74c738a8cac

                      SHA512

                      d20540378cf8e76b39beff338de024d9e061a1c84ab5ac2a0033b2b76f5d845234016b35fcdcabb03c049d65f279101a9993a145b369591b4821c880efb70e34

                    • memory/244-53-0x00000000613C0000-0x00000000613E3000-memory.dmp

                      Filesize

                      140KB

                    • memory/1388-29-0x00000000613C0000-0x00000000613E3000-memory.dmp

                      Filesize

                      140KB

                    • memory/1836-46-0x00007FF934740000-0x00007FF935202000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1836-39-0x000001F84E3B0000-0x000001F84E3D2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1836-40-0x00007FF934740000-0x00007FF935202000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1836-42-0x000001F835D80000-0x000001F835D90000-memory.dmp

                      Filesize

                      64KB

                    • memory/1836-43-0x000001F835D80000-0x000001F835D90000-memory.dmp

                      Filesize

                      64KB

                    • memory/1836-41-0x000001F835D80000-0x000001F835D90000-memory.dmp

                      Filesize

                      64KB

                    • memory/2160-243-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2160-239-0x0000000000400000-0x0000000000457000-memory.dmp

                      Filesize

                      348KB

                    • memory/2364-48-0x0000000002510000-0x0000000002511000-memory.dmp

                      Filesize

                      4KB

                    • memory/2364-6-0x00000000049D0000-0x00000000059D0000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/2364-5-0x00000000049D0000-0x00000000059D0000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/2364-8-0x0000000000400000-0x0000000000558000-memory.dmp

                      Filesize

                      1.3MB

                    • memory/2364-4-0x0000000002510000-0x0000000002511000-memory.dmp

                      Filesize

                      4KB

                    • memory/2668-245-0x0000000000400000-0x0000000000478000-memory.dmp

                      Filesize

                      480KB

                    • memory/2668-231-0x0000000000400000-0x0000000000478000-memory.dmp

                      Filesize

                      480KB

                    • memory/3136-242-0x0000000000400000-0x0000000000424000-memory.dmp

                      Filesize

                      144KB

                    • memory/3136-241-0x0000000000400000-0x0000000000424000-memory.dmp

                      Filesize

                      144KB

                    • memory/4440-105-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-176-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-80-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-81-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-88-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-89-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-96-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-97-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-104-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-72-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-112-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-120-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-121-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-128-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-129-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-136-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-137-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-144-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-145-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-160-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-161-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-168-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-169-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-73-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-177-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-184-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-185-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-205-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-207-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-208-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-210-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-212-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-214-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-215-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-218-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-219-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-220-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-221-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-223-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-62-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-61-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-60-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-59-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-58-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-57-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-54-0x0000000001200000-0x0000000002200000-memory.dmp

                      Filesize

                      16.0MB

                    • memory/4440-250-0x0000000015490000-0x00000000154A9000-memory.dmp

                      Filesize

                      100KB