Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:54

General

  • Target

    ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe

  • Size

    926KB

  • MD5

    1784f051e12e25d36f33965d1a32f806

  • SHA1

    b51d7cba074c043b543a537db2743566fa3ba0ac

  • SHA256

    ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf

  • SHA512

    a741dd7b19fab2192786b64df250adf5ab1538d2645f4c6986d5048a5ded901df5c09f24e39450c43a0eafcd09a1023533de96bbfaf4933bd1377068d81f8766

  • SSDEEP

    12288:i3X4MaU+3Rk/T2xi/tRBd1XRbiacwiy75UZN7I7L7Zu28C//rBA0Rt:EsU+aqxi/vBnAx5ao8nEC//rC0R

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

104.250.180.178:7902

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Microsoft .exe

  • copy_folder

    Microsoft

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Microsoft -QUCX7D

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 20 IoCs
  • Detects executables built or packed with MPress PE compressor 15 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe
    "C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe
      "C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe
        C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe /stext "C:\Users\Admin\AppData\Local\Temp\oudxuopclijvuevrrxlrfsorzlgzoj"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe
        C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe /stext "C:\Users\Admin\AppData\Local\Temp\roiqnhiwzqbzxsrviiytifaiisyapmjwa"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:5092
      • C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe
        C:\Users\Admin\AppData\Local\Temp\ac28e104b06d7025bab07468070e74b3ea0017b34d25e48150b6c55f8ffda4bf.exe /stext "C:\Users\Admin\AppData\Local\Temp\binan"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\oudxuopclijvuevrrxlrfsorzlgzoj

    Filesize

    4KB

    MD5

    18b6368b183e546a35847ae24b4b2913

    SHA1

    040545f7ac2c987d2a79b5e7f1cf9ab83bd25923

    SHA256

    54c101b6b1241b6a0574a66e5a5b9bddc6c60a4daf7338dba6fe3f65b27382af

    SHA512

    68ba8734016705cd12bf9d7ce41d5c823b2ec6ce9ee1ee7e9da9efcd9c88ef1f1b18148d91ad6a271c7a88d4ca098a99198ca709fcf217f9b1fa18f74c48d698

  • memory/1192-38-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1192-30-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1192-28-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1192-24-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1192-41-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4272-5-0x0000000074E40000-0x00000000755F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4272-17-0x0000000074E40000-0x00000000755F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4272-8-0x0000000005FB0000-0x0000000005FC0000-memory.dmp

    Filesize

    64KB

  • memory/4272-9-0x00000000072B0000-0x0000000007370000-memory.dmp

    Filesize

    768KB

  • memory/4272-10-0x0000000009950000-0x00000000099EC000-memory.dmp

    Filesize

    624KB

  • memory/4272-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

    Filesize

    4KB

  • memory/4272-6-0x0000000007050000-0x0000000007132000-memory.dmp

    Filesize

    904KB

  • memory/4272-1-0x0000000000F20000-0x000000000100E000-memory.dmp

    Filesize

    952KB

  • memory/4272-4-0x0000000005BA0000-0x0000000005BAA000-memory.dmp

    Filesize

    40KB

  • memory/4272-3-0x0000000005A10000-0x0000000005AA2000-memory.dmp

    Filesize

    584KB

  • memory/4272-7-0x0000000007130000-0x000000000714A000-memory.dmp

    Filesize

    104KB

  • memory/4272-2-0x0000000005FC0000-0x0000000006564000-memory.dmp

    Filesize

    5.6MB

  • memory/4544-33-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4544-37-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4544-32-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4984-47-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4984-50-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-23-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-57-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-20-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-21-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-18-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-56-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-19-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-55-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-15-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-16-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-14-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-11-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-46-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4984-12-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-44-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4984-48-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-49-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-54-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-51-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-52-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4984-53-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/5092-26-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/5092-29-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/5092-31-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/5092-39-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB