Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 01:26

General

  • Target

    OSE - PO & FCST - ???-LT24052303183991-01.exe

  • Size

    15.0MB

  • MD5

    4cbc670c79dddc759b63ded7f36a80e1

  • SHA1

    7bf50c94959846e1c7caf521e697ee2367aabf01

  • SHA256

    1dd45a1200496700a9a9e138a0ecf1625c981855159ceb8624fe69b8bcfe3bb5

  • SHA512

    6bc15e6acbfdcf09e5eefc1fcc02e997ae81c2b9bcbf02df78ba6c3db8c8620130880fa2d6e49a1b3a9e7df2b4f5e428d8cb4326e6679d9e0639dc40ce099535

  • SSDEEP

    24576:y6nVMk+HIj90cmvFMN8O6TXQRfAGWEUAxqnRAIsJumwocd5xShmC+a+OPj:xVz7tWqKTXQiTpsJr/Qx8ec

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

b64c611.ddnss.eu:3154

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    uytrs.exe

  • copy_folder

    iu7y6tr

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    u8tus.dat

  • keylog_flag

    false

  • keylog_folder

    87y6trf

  • mouse_option

    false

  • mutex

    OIUGH6-BFBAXD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OSE - PO & FCST - ___-LT24052303183991-01.exe
    "C:\Users\Admin\AppData\Local\Temp\OSE - PO & FCST - ___-LT24052303183991-01.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\dvlv.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4672
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • Gathers network information
          PID:4788
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ttujxo.dll hghnvjmhol.mp3
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4236
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ttujxo.dll
          ttujxo.dll hghnvjmhol.mp3
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • Gathers network information
          PID:964

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\87y6trf\u8tus.dat
    Filesize

    144B

    MD5

    73e56f9511ff5e60e57038806c511d82

    SHA1

    12ef16edb2dc029bc04e15070fa127c9dba0e86f

    SHA256

    db25cc83bf60a813cc2cef52b293c42077c5f3d204ab58a09f8fb6acec2e8526

    SHA512

    37912c03923dc46bd33352d1bb1521b9f0e5e7ff377c4a50c4d909de8859d35db8b55b3a640584bc7eec7840cf99278548c7cb6250eacf30da4915800dcceb93

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\adkwpjv.jpg
    Filesize

    554B

    MD5

    ddbce26710f45a539e8601e0a447934f

    SHA1

    b3d2be9eaaa912cc3ade2fcbab287ae8b8c6b46c

    SHA256

    7d11a8485973e0bc566c1db8fdd856c330912875f6b5ab926055566442d3aaa8

    SHA512

    cf5f5ba1909ec80e016e08d431bd6e0729a6c7730571d1658f4359f593899e43f014123199b66e6cca01799bd08d8cb5107ac1c5fb8f69983122339e187dd9e2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\akxhkp.xl
    Filesize

    586B

    MD5

    1470895a9833ec3d6efcbf513344c2f1

    SHA1

    14f065147f0a071e8359372256dfc8fe6036c102

    SHA256

    30bc8aee625a4fc70fb99eb0fe99aae51101a78fc1d7ce6cf88b9ad8b974225c

    SHA512

    686c5e2c276ccf80dd5211dd3338964368ae3e74b23b258841c5646cf31157cbbc8a7b8e23f17f8430d312076f12b51493529255c5d4f5acba2700def1690a40

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ccfuehe.txt
    Filesize

    548B

    MD5

    c302f688094bc56571eb12370fcf141c

    SHA1

    2a8c53ade2a08aafdb9494120ea9b4fd700ad094

    SHA256

    ea4fc55e495c8888425bd5d58ca715629bc6394cadec75aa4584c38f5639118c

    SHA512

    3c977e3aab36ed2713234de9683a98d53fc03d8462812d642ef82c7eac61896aba233e1d3f8464bd6366a7875cb24c450b853c341253e15e47c454dd320ea4cd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dqvn.ics
    Filesize

    882KB

    MD5

    e171c9f38793118e7905b2f02689d3de

    SHA1

    74536f29cce7dbb80c54f885edb260847185a8ae

    SHA256

    b7a631d237298b76fc459dc3046bd310a3e9dcb57112caf478b08592a9e0d143

    SHA512

    d5d6041babb8ff290485ebd43e01e39fd21014ebd77ec5114a687cdf7d70179136cab304e76780ffd7971303343f868442d25f453e8674744fc8a0cb4a951961

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dvlv.vbe
    Filesize

    84KB

    MD5

    6e08612ee9e89454fcbf9cd29aaed06c

    SHA1

    8c85626b1a89d18ed1379beb5ac8456ab97bb3c3

    SHA256

    b0ecd1e6ab42c8c2872837818659757d25a45759d94233f8bb792a460bd779e7

    SHA512

    419a8dfec5f90977e987a40fc09e6fce25e54f508cc1d4abd60d73f35e054f53d58084e70daea2c44b42b1731b7446b7c74470089ff703268d9fe07d245f9bf4

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\eaxutnil.exe
    Filesize

    625B

    MD5

    93066def3dc388de942d3f7315ff6a1f

    SHA1

    75b4fb0563252d95d0997832de5230ffeaa81e83

    SHA256

    e84a46926dc23fc9ae49b564e0350187faa1233abdda99fc16c050a224950b31

    SHA512

    044ce13ade56ec4dc7c170a0c16356467df7e79091b2f69a405cb23fd3c1aaea08cb5fbf336b3da86b00f20fadcbcd25949981c0a5055b5fc7bf7e9e4e952b1a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hhhsam.icm
    Filesize

    560B

    MD5

    52601f432c71a83460703926660dd847

    SHA1

    bf28d10b021c961ccccc160eafad3304669d12c9

    SHA256

    90ca364fa9f567cf377238ed00778fc89bd4e6edda37d1bfc08359152d523ce1

    SHA512

    8945b1081cda9074427a535f9665c6f48a784d9ab66ece34264c9dae52cf901531d1261149ecaf611a07d3481f941a8b2f804db6768480d17c2cd5e0b313c672

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ixvwpug.xls
    Filesize

    529B

    MD5

    054d4a1745a1bdff1309309b754944cf

    SHA1

    c3e865f3df5bac877d9d07ecfbe12123fc2a7f43

    SHA256

    82a02b6a19ef473dd8658f1ac296972f384c40cdb9d7066bb59d6896e7ca4faf

    SHA512

    5f2f5b328e0c6446655b74babbfbc4da98bf0bddcb779092d95fc2b846ead1d2ae51257b8e0b8c6815f481911e7732dff9b8a9a9bbd1e8eb396427b635be524a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kausl.msc
    Filesize

    550B

    MD5

    83e1f0086b62a6427528aee6aac20490

    SHA1

    555581c05b82c5b5c23176e009a71833ca92f94d

    SHA256

    5dfcd6be5cbd28f62c03acfd5e3b5b556887826da98fea9ad4527577a4fa0ed4

    SHA512

    b1ccf1a71573770202b3ad647baa23562319f22a093d00da316613c317df8fc79c5de089c264c2649eec9ce984c9ae1ad807ad1aca3901d0bb3b354406ab6764

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kpklatl.pdf
    Filesize

    596B

    MD5

    218c5d5d78f00bed6d7a1796a3dacd50

    SHA1

    2425e26f1285032c1eb753c38c8e4184e11c5f4e

    SHA256

    b214487887bfec30ccf89d31c79c9e8a4b997b6f128d5f35d7a0b5d41475de42

    SHA512

    6e519e25cb5ce0f9c4e4a2174f4fb438264bda087116865db2e5bd9e9538d8a91d37f1935fb2316d574063a35f13d5006e242f288f449e445c3d6f6d3626fe7e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\psud.jpg
    Filesize

    649B

    MD5

    68057a3ababb53cc194305aafb678316

    SHA1

    6a9d23fd3b1d7ca21a1f73ae10e79d526e53ae9e

    SHA256

    beedd19808df570ba564bb5eba0ce432346d23285f854523914b234c9879f810

    SHA512

    0d8fe180c407e3c5866cf2c4448cbafc734e047deba2943e0491f81b730a830828669ed859dfe43b82145b6769cfbdc52aba1d882b5ea3a4978f94ac9ed5e691

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pthiwoamn.bin
    Filesize

    34KB

    MD5

    bb04e48350eb8c97b835ef2bf8310ca1

    SHA1

    a9a8364c25d2ec7bbc9700543ac4361abad1bacf

    SHA256

    0abedc60fda83fcad7c3b8d40e8cc6159b8bb033ea9dc0a1e24ee8d5118407c0

    SHA512

    956e72c43a58da659a4c840c7ba1052e689ea225528c586d0ee0c8b43807280ff8f149c7ce531ec25d5d95a4a434618ff4e3e6b5043a0db234112cde4ba31ba1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pthiwoamn.bin
    Filesize

    34KB

    MD5

    197d5b4cf8de9940b5fdcad912ab949d

    SHA1

    24ba8d11bfc96821a4fcbf56e6b6713ad0c79ac7

    SHA256

    db755fda24ff2b5cd7fbd953dc523298d0c4cf4029b4c3efc27559ccb8f37f83

    SHA512

    b23a5d38340a732be91cc0d2faf8dad8bd3f8abf868e5801c3bcdf90bcc376c53ab8d254efebf165ba5f5b840db5e01123e8d544cd86ce5faa6a43436d8ce6e1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qurddcxnm.dll
    Filesize

    620B

    MD5

    3c5bcc0ec42d859aa04884c22acbf316

    SHA1

    8f17c190b9499d184f2d275ebe1e9c5fbdde77c8

    SHA256

    152aef9576a636e3e816316af35335e9ea7975578663ef09abd9a92151c89cf7

    SHA512

    06fcbff1552ee01480bdb989edad0a8f6e8e66a7e7d45d64a5b033b6dd1f7c0ba9006f7f59db1034a78d4006eba393ecdf349d6b29c3d7024c801a586ccb5c00

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tlifisl.docx
    Filesize

    646B

    MD5

    de8d472a3d4669f06d925922a1634ac7

    SHA1

    a7ad5663c99c54a3f4cd12a82568e91f8be75d44

    SHA256

    14ea61c83d53e06f750ddcfd89edf54e17a0d91f8436b801f79892172785db92

    SHA512

    cd2fc7b4363f8b38af60afa70dad82612d49f441d3442fcc24096429f4a68316fbbda993c0277f22ebfc052e698e61ec9c3ef0290eca8651d2fd73c85ce46236

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ttujxo.dll
    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tufkdrjntj.mp2
    Filesize

    642B

    MD5

    28a66e58594a445f3efbe8c8e4010ee5

    SHA1

    cd8822bcc7bce5be52bb97b344adaeb4eca43ae7

    SHA256

    528166f38e46858c3c46e2fcffb2baccc77b558799e83acc0d598d36225c8a57

    SHA512

    b082203870dacd4b710c9495e4618e2633c6e3460399e61127f25432c05ccc9a553d082536ef88c222f2d1673d572d6caad9c5934a6c70db94e7bd3696f2342f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\twklhta.txt
    Filesize

    507B

    MD5

    de7ca529b6fea56a907eca2d3e748245

    SHA1

    51078d21b189329107fc46778a841574c88257f6

    SHA256

    024718705fce4644cb98c19687383729ecef949e88576a6421a1d77179fce678

    SHA512

    c7c65617025f0f191e7b9e475f849cedd0ff1168362c6fc011b105d6d188ba59b520ea6b7a6a9fafc71a983f70ff882b3b766d65addb3e3078056ffe1772e6f6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\vkhuddrb.ppt
    Filesize

    503B

    MD5

    18a894cfb8cbc95827c54524ebbdb5bd

    SHA1

    9eb1e8edc274224fabc9b9828beba114d3442594

    SHA256

    f94bdca1bc2f36f20a4731a980779bc85fb9f9e022bbedcb6b85ae12fcbd851d

    SHA512

    7f5e62c8fde6b1728754246cc37b8e97d0f5ef553d5b10e695bed292607354a09300c8dfc5a5acc077b74d93715546d3f38e249a5245cd6ec81b06649770ce25

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wrprwamnt.msc
    Filesize

    547B

    MD5

    d6f3f07c28fc3423a098297f1b7987eb

    SHA1

    214c4154bbac33f603ec27ad2dc059212fa06f14

    SHA256

    3508682f67971cd41747e16734c952fb223875284dcbec53801b26346abfcea5

    SHA512

    9410805203005d3964f4c9ba8099477a7451da4663a3e5ba99b2a9c396aa2464eb6050fba722f0786be7e90fe97e806bf51b25c381b45870c217021f82088a06

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • memory/4324-132-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-141-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-125-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-130-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-126-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-133-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-131-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-123-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-142-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-129-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-150-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-149-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-157-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-165-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB

  • memory/4324-166-0x0000000000D00000-0x0000000001D00000-memory.dmp
    Filesize

    16.0MB