Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2024 19:10

General

  • Target

    List of suspected clients/ptSrv.exe

  • Size

    202KB

  • MD5

    64179e64675e822559cac6652298bdfc

  • SHA1

    cceed3b2441146762512918af7bf7f89fb055583

  • SHA256

    c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9

  • SHA512

    ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280

  • SSDEEP

    3072:EMtKztOp6KfOQqoY3ltdNjlcwsSdplkrxf+Uyecgw:ELKfOQLY3l9jlcwnlUf+z7gw

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.9.2 Light

Botnet

RemoteHost

C2

66.154.102.133:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-W6WVSY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe
    "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe
      "C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
            PID:1500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1d62d03e

      Filesize

      64KB

      MD5

      c8c6d9830d857f6c5bab5be513497512

      SHA1

      1f58bfa13522e174e7cbe8a3fa3ec3d3001d2f17

      SHA256

      cbe82142612770eea3a8cf109192fe16637f58c582f74e8099e2fa8635ebef54

      SHA512

      d12f687625ef0a40eac33f836081fa6a61657ae1bd5312f8346b36085311ad89b811a908fbac5f1c5782353b8e0e000897ce8f0bdd2d4fdef2e7a815a60d9c09

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\MSVCP140.dll

      Filesize

      427KB

      MD5

      71a0aa2d05e9174cefd568347bd9c70f

      SHA1

      cb9247a0fa59e47f72df7d1752424b33a903bbb2

      SHA256

      fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

      SHA512

      6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\VCRUNTIME140.dll

      Filesize

      81KB

      MD5

      16b26bc43943531d7d7e379632ed4e63

      SHA1

      565287de39649e59e653a3612478c2186096d70a

      SHA256

      346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

      SHA512

      b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\assignat.avi

      Filesize

      41KB

      MD5

      cd162f403f22216679f486ffa15fa534

      SHA1

      dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9

      SHA256

      9f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2

      SHA512

      b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ruffian.dbf

      Filesize

      875KB

      MD5

      a12fc5b2c56174be480fc3c720c7fcdd

      SHA1

      48cc8b9a3cd29bcc57a244dee5300d02e2487cf0

      SHA256

      c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2

      SHA512

      8abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\wbxtrace.dll

      Filesize

      103KB

      MD5

      530af153319a8254261d2de81b40cfe7

      SHA1

      63c7fb08e4dfe1e1cbd40a0fb333472822daa60a

      SHA256

      098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3

      SHA512

      6a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805

    • \Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe

      Filesize

      202KB

      MD5

      64179e64675e822559cac6652298bdfc

      SHA1

      cceed3b2441146762512918af7bf7f89fb055583

      SHA256

      c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9

      SHA512

      ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280

    • memory/1500-94-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-91-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-95-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-88-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-93-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-87-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-92-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-96-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-90-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-86-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-89-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-81-0x0000000077130000-0x00000000772D9000-memory.dmp

      Filesize

      1.7MB

    • memory/1500-82-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/1500-84-0x0000000000BE0000-0x0000000000E61000-memory.dmp

      Filesize

      2.5MB

    • memory/1708-0-0x0000000074620000-0x0000000074794000-memory.dmp

      Filesize

      1.5MB

    • memory/1708-1-0x0000000077130000-0x00000000772D9000-memory.dmp

      Filesize

      1.7MB

    • memory/2588-78-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2588-80-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2588-77-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2588-30-0x0000000077130000-0x00000000772D9000-memory.dmp

      Filesize

      1.7MB

    • memory/2588-28-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-26-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-25-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB

    • memory/2700-24-0x0000000077130000-0x00000000772D9000-memory.dmp

      Filesize

      1.7MB

    • memory/2700-23-0x0000000074610000-0x0000000074784000-memory.dmp

      Filesize

      1.5MB