Analysis

  • max time kernel
    147s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 01:39

General

  • Target

    Quotation 20242204.exe

  • Size

    1.6MB

  • MD5

    603c7916d424615645d6ee0fffa00011

  • SHA1

    6f464f23eb81606067f93036dc5cdc61f7bb855b

  • SHA256

    25adcfe6b38aead70b4b0020ecba72d0343b6f3d3bb406100593b7f1349e0300

  • SHA512

    f400834902c5886b680fa8376fee88c77ec352b0a00221e98fbe268d71ac6feb0826fb5c53d71cb66cc457d6b3a64c3c881f059dd75bb9b097d51868ea07cf90

  • SSDEEP

    24576:7MkT4gLKu9KKozJQd/HJNRO/BqM6wIJp4m+3bu8U2flxAv:QkTpT9K1mzyqM6wW4mEQ2W

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

127.0.0.1:47212

officerem.duckdns.org:47212

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-I8N3XG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 13 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation 20242204.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation 20242204.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Public\Libraries\RwksdoebO.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
        3⤵
          PID:2532
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
          3⤵
          • Enumerates system info in registry
          PID:2576
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
          3⤵
            PID:2948
          • C:\Windows\SysWOW64\xcopy.exe
            xcopy "Aaa.bat" "C:\Windows \System32\" /K /D /H /Y
            3⤵
            • Enumerates system info in registry
            PID:2968
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
            3⤵
              PID:2004
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
              3⤵
              • Enumerates system info in registry
              PID:1996
            • C:\Windows \System32\easinvoker.exe
              "C:\Windows \System32\easinvoker.exe"
              3⤵
              • Executes dropped EXE
              PID:2428
            • C:\Windows \System32\easinvoker.exe
              "C:\Windows \System32\easinvoker.exe"
              3⤵
              • Executes dropped EXE
              PID:2180
          • C:\Windows\SysWOW64\extrac32.exe
            C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\Quotation 20242204.exe C:\\Users\\Public\\Libraries\\Rwksdoeb.PIF
            2⤵
              PID:1932

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\remcos\logs.dat

                  Filesize

                  144B

                  MD5

                  6445a787f8a60f64401a47ba23c610d3

                  SHA1

                  88066d762bccc398dc008262aa66b11b9183a27b

                  SHA256

                  2fc5b6baa7a08dcc0663ef45b2d50f1d59a2041f0f50f86e23c79475066bd212

                  SHA512

                  09b1eac598406ead705203a66389ba8c7fb12562f27a2e6a7484156f789e7ec5ff4a309bcf0395f865618c74475fd63cdf3bcd9c66c1489ea1e6d650c038384f

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                  Filesize

                  68KB

                  MD5

                  29f65ba8e88c063813cc50a4ea544e93

                  SHA1

                  05a7040d5c127e68c25d81cc51271ffb8bef3568

                  SHA256

                  1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                  SHA512

                  e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                • C:\Users\Admin\AppData\Local\Temp\Tar3CF8.tmp

                  Filesize

                  177KB

                  MD5

                  435a9ac180383f9fa094131b173a2f7b

                  SHA1

                  76944ea657a9db94f9a4bef38f88c46ed4166983

                  SHA256

                  67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                  SHA512

                  1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                • C:\Users\Public\Libraries\RwksdoebO.bat

                  Filesize

                  29KB

                  MD5

                  828ffbf60677999579dafe4bf3919c63

                  SHA1

                  a0d159a1b9a49e9eaccc53fe0c3266c0526a1bdc

                  SHA256

                  abac4a967800f5da708572ec42441ec373cd52459a83a8a382d6b8579482789d

                  SHA512

                  bf00909e24c5a6fb2346e8457a9adacd5f1b35988d90abbde9ff26896bbb59edafea60d9db4d10182a7b5e129bb69585d3e20bc5c63af3517b3a7ef1e45ffb7e

                • C:\Users\Public\Libraries\aaa.bat

                  Filesize

                  3KB

                  MD5

                  71e46efe9932b83b397b44052513fb49

                  SHA1

                  741af3b8c31095a0cc2c39c41e62279684913205

                  SHA256

                  11c20fabf677cd77e8a354b520f6ffca09cac37ce15c9932550e749e49efe08a

                  SHA512

                  76da3b441c0eaaaabdd4d21b0a3d4aa7fd49d73a5f0dab2cfb39f2e114efe4f4dabe2d46b01b66d810d6e0efa97676599ece5c213c1a69a5f2f4897a9b4ac8da

                • C:\Users\Public\Libraries\easinvoker.exe

                  Filesize

                  128KB

                  MD5

                  231ce1e1d7d98b44371ffff407d68b59

                  SHA1

                  25510d0f6353dbf0c9f72fc880de7585e34b28ff

                  SHA256

                  30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                  SHA512

                  520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

                • C:\Users\Public\Libraries\netutils.dll

                  Filesize

                  114KB

                  MD5

                  566b326055c3ed8e2028aa1e2c1054d0

                  SHA1

                  c25fa6d6369c083526cafcf45b5f554635afe218

                  SHA256

                  a692d4305b95e57e2cfc871d53a41a5bfc9e306cb1a86ca1159db4f469598714

                  SHA512

                  da4b0b45d47757b69f9abc1817d3cb3c85deb08658e55f07b016fba053efe541a5791b9b2b380c25b440bbae6916c5a2245261553ca3c5025d9d55c943f9823c

                • memory/2464-83-0x0000000002380000-0x0000000002381000-memory.dmp

                  Filesize

                  4KB

                • memory/2976-95-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-100-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-2-0x0000000003530000-0x0000000004530000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-93-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-0-0x0000000000220000-0x0000000000221000-memory.dmp

                  Filesize

                  4KB

                • memory/2976-96-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-97-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-98-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-99-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-4-0x0000000000400000-0x0000000000598000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2976-101-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-105-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-106-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-1-0x0000000003530000-0x0000000004530000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-116-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-127-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2976-128-0x00000000162E0000-0x00000000172E0000-memory.dmp

                  Filesize

                  16.0MB