Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233.dll
Resource
win10v2004-20231215-en
General
-
Target
e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233.dll
-
Size
150.0MB
-
MD5
3ceefa7bd30b2b5494c2cdb64342835c
-
SHA1
ef4cad7600788cc696cec53480dcfb67a5143adb
-
SHA256
e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233
-
SHA512
a3f88fae400037427d3068d583317c08132ff936c21c3fa38a97afedb9b614302228903973ed3aa8b41fb266f5e1aa3c7550ce4b4653ea9d4b1c06a0c350880f
-
SSDEEP
786432:7UP7GCGO7b0Srkx/tC0SzIdSwh/WxbpNHQD3trzRp:7UP7GCG64Srkx1hSzYsHQD3t/R
Malware Config
Extracted
remcos
RemoteHost
ogbatobanana.duckdns.org:4047
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0R92B3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeWScript.exeflow pid process 37 3036 WScript.exe 39 3036 WScript.exe 41 3036 WScript.exe 51 3188 WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeRegSvcs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation RegSvcs.exe -
Executes dropped EXE 2 IoCs
Processes:
RegSvcs.exeRegSvcs.exepid process 5112 RegSvcs.exe 4720 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*Chrome = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\VIVA_01.dll,EntryPoint" reg.exe -
Drops file in System32 directory 1 IoCs
Processes:
regsvr32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
regsvr32.exepid process 756 regsvr32.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exedescription pid process target process PID 2272 set thread context of 5112 2272 powershell.exe RegSvcs.exe PID 2272 set thread context of 4720 2272 powershell.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
regsvr32.exeRegSvcs.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 936 powershell.exe 936 powershell.exe 2272 powershell.exe 2272 powershell.exe 2272 powershell.exe 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
regsvr32.exeregsvr32.execmd.exeregsvr32.exeWScript.execmd.exeWScript.execmd.exepowershell.exeRegSvcs.exedescription pid process target process PID 3792 wrote to memory of 756 3792 regsvr32.exe regsvr32.exe PID 3792 wrote to memory of 756 3792 regsvr32.exe regsvr32.exe PID 3792 wrote to memory of 756 3792 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 2664 756 regsvr32.exe cmd.exe PID 756 wrote to memory of 2664 756 regsvr32.exe cmd.exe PID 756 wrote to memory of 2664 756 regsvr32.exe cmd.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 756 wrote to memory of 4040 756 regsvr32.exe regsvr32.exe PID 2664 wrote to memory of 3408 2664 cmd.exe reg.exe PID 2664 wrote to memory of 3408 2664 cmd.exe reg.exe PID 2664 wrote to memory of 3408 2664 cmd.exe reg.exe PID 4040 wrote to memory of 3036 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 3036 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 3036 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 3188 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 3188 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 3188 4040 regsvr32.exe WScript.exe PID 3036 wrote to memory of 1992 3036 WScript.exe cmd.exe PID 3036 wrote to memory of 1992 3036 WScript.exe cmd.exe PID 3036 wrote to memory of 1992 3036 WScript.exe cmd.exe PID 1992 wrote to memory of 936 1992 cmd.exe powershell.exe PID 1992 wrote to memory of 936 1992 cmd.exe powershell.exe PID 1992 wrote to memory of 936 1992 cmd.exe powershell.exe PID 3188 wrote to memory of 5048 3188 WScript.exe cmd.exe PID 3188 wrote to memory of 5048 3188 WScript.exe cmd.exe PID 3188 wrote to memory of 5048 3188 WScript.exe cmd.exe PID 5048 wrote to memory of 2272 5048 cmd.exe powershell.exe PID 5048 wrote to memory of 2272 5048 cmd.exe powershell.exe PID 5048 wrote to memory of 2272 5048 cmd.exe powershell.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 5112 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 2272 wrote to memory of 4720 2272 powershell.exe RegSvcs.exe PID 4040 wrote to memory of 1076 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 1076 4040 regsvr32.exe WScript.exe PID 4040 wrote to memory of 1076 4040 regsvr32.exe WScript.exe PID 5112 wrote to memory of 3344 5112 RegSvcs.exe WScript.exe PID 5112 wrote to memory of 3344 5112 RegSvcs.exe WScript.exe PID 5112 wrote to memory of 3344 5112 RegSvcs.exe WScript.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e8eb6be89b47c2c5f4b61da460ae6c6d6bf150869624ad487df74b0d80351233.dll2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*Chrome" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\VIVA_01.dll",EntryPoint /f & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*Chrome" /t REG_SZ /d "rundll32.exe C:\Users\Admin\AppData\Roaming\VIVA_01.dll",EntryPoint /f4⤵
- Adds Run key to start application
PID:3408 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"3⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Memory.vbs"4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WindowsServices\XWWTS.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\Admin\AppData\Roaming\WindowsServices\MNUZY.ps16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Memory.vbs"4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WindowsServices\JDXGA.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\Admin\AppData\Roaming\WindowsServices\MOAZS.ps16⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\iilww.vbs"8⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"7⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\uzjvjwpomgqleldypuhcq.vbs"4⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
503B
MD55d3fff1b9b0b50c2d1b978b5e26fe28d
SHA18c382cb42267ee979a412bc0a950e67b91822fc3
SHA25602a302fb8ae7cdd340de1726f1e89bd67b012dc311e7f1e555be28bdae3f3ca7
SHA5123848ba48b10eeee832fe18d3d8a5645ccbf0ce294e05fbcdacae19285a12524d1c246fbce6507345a987f5998ab6361169aa4f0977afbc5c57249c9a350f101c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5691526770e90e29ed992baff601093c2
SHA173ddb5ca0d2ef2147a254737c59c5eaf8a3453cd
SHA2562d5a065d012cba33cf480445063fbafbd0e21da48f0f7f745974f21a0312d662
SHA512db5957dc2b863613505be8a67a307d8ac4e1b79410e1390def4f96bc2af9b191cabcddbd0e608f86a76cb4e963a1483681fcb9c5331a9d73c1c9a015e96208f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFF36071456820AC60FD568DDF18F256
Filesize552B
MD5a3b4e53f08bf25ff61d5c01f367f78c3
SHA1e92970d6f3c3252f6359d15aabaa9aa6c31db0f4
SHA2566b844f8c95f0ba2180558d5ef59b53c4590fa398f9368f3c9225f71d2ac9492b
SHA512689c3c9ac6b1feeae6412c1a46f3b6a8e52353c7eb65e5ae679322cd61ca2c8370c55a6b4aba6cb2714896f2eb3d66281bfa3114ffc36638408c43ad30d8dbcb
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56681dde54f627893513e4d79bd92c16c
SHA187e4c3189440a0576f90a5710894ad0590143a8d
SHA256eac4af70d9b3ee49dfe2fa532826a93d976f9d9bc1827f52b5d7749b490b6720
SHA51257884a982e9dcf38fdbf8da3e0a94fc13868a3fef2469d8b07544e8e95678f5f44a15bd51c69fa898e97bd60e0b3ec71515925fe1f2ee9f28b08ce44e8034298
-
Filesize
6.1MB
MD5f2423557341720ee37a3ca4160ab350d
SHA1dff2f296535fa069dd29ad0860bb1d3ca61a1e37
SHA25682c1e03d1965f9efb7597e8999cc8464d471be14657d42362b4d6ffdb257d2d7
SHA5123a0ec132bcb1239afa7046130eaf86e41a0693dc79d482124df0e93a1312dc4021a43c0a9db6b48ae201e322e9c61a3b0ac6ae791395d398404140cd79d7ed03
-
Filesize
8.4MB
MD569e0e19835d62203ac824a0a042f80e9
SHA1891a847ee52943e9d1eb9ab024a59651dbe74c7b
SHA25623ecd046f3370b97563b8a0bbb6c93f3792d00446cf54f9836f21b31316a4264
SHA512a55b07747607e746f8138d509cf823d72e41581ea1a39d0948f5834d87e35edf93eebd1f5db6f50c18a812cb13c8f6232fd9f47d858c3125f82bd885a6079f46
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
500B
MD57c511f6f0add80ad7f9b0b22d50959f0
SHA1e656bc5752fa864e6c1b86033530f31b9ca9e726
SHA25639f9ff071536b555e9b7da9e0104cb979f22f5236abe9eca9a5b90718b36da15
SHA5123ee23b4f523454ef0b88dab5a543e2be704f9e1e37ccde7a8e0b17b1613e4db6235e18adccb3f9d44c1e76faac0c7caabfaf51e76b449a6d785dfb3ef4b9a918
-
Filesize
448B
MD5322928831a8b29ebc06d5bc8edbec60d
SHA175b4a66f691a9550423f5acdb0fc46142c05a1fc
SHA25693d2d9e801aa2189593ed51e168564c69d964dbf71579c2195586a58445b52d8
SHA5128a6584e36803189d78b20f251771779745774dab3bee0366082b913e2395233dfd7cf83c84e6c5419ed5662045875c16123b075d706d23f3d57a732ce8666ca3
-
Filesize
276B
MD5e7d45c26e15f21e975d223e45b7da4eb
SHA18c3a9930d33100cd884f39e8e731db760df63e9d
SHA256ca21215bc5b694571f93809e6244ef75c69d71649d3598ddfd0aa5e651a9fc71
SHA512e3cdd9b6904e192d9d1114b5715af1116bddca0e42e34707349fad7f4f3f0f505196ef2cdb1fd0a310727c41154bacee25fd1c0052ab2589289c3a1c617a06d2
-
Filesize
276B
MD5cf213bfcfbf6fd9aa3a9954929f1fbb1
SHA1e67bfa49f24f815df08b86a26fba794a6e7109bd
SHA256c876a1d0b87f4bef0ecbc673b18013a42ad86d1e7e243a917ddf66146dba891c
SHA512efc04c9539cb35813ef2a6c06ec9834041f034996add5683908dfb977b2ca79cb62eb63641ac462393d550336efc4a9a85493f935e6c984284fc0724176aeb39
-
Filesize
75B
MD5bd6857a941997730269e24a8c8cfd1fd
SHA15fd0b1db9aa4fbee2cdac89c9411029747017e94
SHA256dca163e5a20432b2e3f4b0c7e2f117d5a0d0b9b43a4ba54e7577a2f4880695fd
SHA512678db8d6d7660fc478e48818aff8ec6a04221e78b6a63cccf52622d6fa29b3d1476c7a388ef41c47f4852bfb211e037bbff051a830805141fbd53a656840bc87
-
Filesize
18B
MD526fde7d375d1bd5bb2365e3c9f01a803
SHA1226f0e4fd419f92ef65464bac9656f3a33c9c754
SHA2563d9452c2294d672986b03b274fdc8111c38b87efc76163995b7a257d5c6c2ee6
SHA512499a237f13b0bb1e7880d29c057bee403075039f4592e59c10f95d3e57aaa9e2aa37de61f3f5b706f03438778955bb23d3f847ba116e3784eb3534725c7b3326
-
Filesize
1.1MB
MD55cf2c1666ad003aa8b6cd8a97cd584a0
SHA11660e606e6408bca33e935ce190e0a1ebbec631f
SHA256ec81e2567d6389125069a1b4724d927707ee00f12af4e0f9d8751f379ae9f7c3
SHA512eb6d44a1c5a8cf06fab45ca0981a8ba13b3e529b424f75656d3b371125d11f39ee386ffa1802e1b0202395fcfd338905cb70ef6af1a1a69ff1afb677b836cc9e
-
Filesize
75B
MD5ae51876ebf33b5bc2b49115a5f0ce077
SHA177a138eac0ebf7a9ec90fb299570166089038321
SHA25610fd06231daa6f01e645d0b3ca70b1043c6dbacdcfc2523060adb1880effe2ca
SHA512d19338c6a5d8851b15f2b9d46e31dbb2e9570a02456c76b01be9c70a376aa2520b25791eaedc48cabdb382bab17fd7200f3eb2c5917f029cefa3cd227192fb4d