Analysis

  • max time kernel
    251s
  • max time network
    247s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 14:28

Errors

Reason
Machine shutdown

General

  • Target

    Tax Organizer.exe

  • Size

    6.1MB

  • MD5

    4864a55cff27f686023456a22371e790

  • SHA1

    6ed30c0371fe167d38411bfa6d720fcdcacc4f4c

  • SHA256

    08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2

  • SHA512

    4bd3a16435cca6ce7a7aa829eb967619a8b7c02598474e634442cffc55935870d54d844a04496bf9c7e8c29c40fae59ac6eb39c8550c091d06a28211491d0bfb

  • SSDEEP

    98304:VZQIM+/nv/CDoAkYwpAa5ge1zZ/jtdZwUkQ:bJCKlA2VKUz

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

deytrycooldown.duckdns.org:7070

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-TYSCJG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 12 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
    "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
    1⤵
    • Suspicious use of NtCreateThreadExHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
      "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
        3⤵
        • Drops file in System32 directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4512
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f
        3⤵
        • Adds Run key to start application
        PID:3612
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
      "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
      1⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
        "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
        2⤵
          PID:4980
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f & exit
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f
            3⤵
            • Adds Run key to start application
            PID:4780
      • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
        "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
        1⤵
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
          "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
          2⤵
            PID:3264
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f & exit
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4464
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f
              3⤵
              • Adds Run key to start application
              PID:440
        • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
          "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
          1⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:412
          • C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe
            "C:\Users\Admin\AppData\Local\Temp\Tax Organizer.exe"
            2⤵
              PID:4036
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f & exit
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2156
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\ChromeData.dll",EntryPoint /f
                3⤵
                • Adds Run key to start application
                PID:1896
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k SDRSVC
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:5024
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
            1⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:1852
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2300
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3588
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:2272
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:2356
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:1828
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3600
                      • C:\Windows\system32\sihost.exe
                        sihost.exe
                        1⤵
                          PID:3740
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          1⤵
                            PID:4896
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            1⤵
                              PID:732
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              1⤵
                                PID:3808
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                1⤵
                                  PID:4764
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  1⤵
                                    PID:1636

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt

                                    Filesize

                                    84KB

                                    MD5

                                    d59755ca0e443ee043b4d23d2db48d5a

                                    SHA1

                                    8ae4db766c06519f92c9190fe2e5e2e6c290c63e

                                    SHA256

                                    b0d460c9e46be926d65a0e23996b0ead1c696542942045c99bf10503b600f2d6

                                    SHA512

                                    d326ab6355758672fb0c7c0667984d63a2a696c18ca8be3b3b3ece44016c7113294e1dbd4dbb24764eff756f99d142d9a1f3de4aa6fe3bad5d4155a6751e8215

                                  • C:\Users\Admin\Documents\ChromeData.dll

                                    Filesize

                                    930.4MB

                                    MD5

                                    cbda512457f663725728da9df882d903

                                    SHA1

                                    cdb4832042e9f10f595aadf6228661837f048937

                                    SHA256

                                    4faf16da1d5d6ebf2a75b298591de8d3f05db5cd94f007a17f9b0804655c1dce

                                    SHA512

                                    3fdcc429dafb855e28da8554af6d82757395582d60c3a2de132f4eaee04fbbc0ff4617e0700275e3fbf0b33120d6db6e39766a6b2b6307f4f1444a9a1dd53ab4

                                  • memory/412-45-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/412-42-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/1000-16-0x0000000012DA8000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    180KB

                                  • memory/1000-1-0x00000000102E6000-0x0000000010300000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/1000-0-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/1000-9-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/1648-27-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/1648-24-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/3264-39-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4036-46-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-51-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-6-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-18-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-19-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-20-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-21-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-22-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-23-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-2-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4140-15-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-52-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-12-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-10-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-11-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-8-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-49-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-5-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-17-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-7-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4140-50-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4512-59-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-65-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-60-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-53-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-55-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-54-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-62-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-61-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-63-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-64-0x0000000002750000-0x0000000002751000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4636-38-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/4636-35-0x0000000010000000-0x0000000012DD5000-memory.dmp

                                    Filesize

                                    45.8MB

                                  • memory/4980-28-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB

                                  • memory/4980-30-0x0000000000A30000-0x0000000000AB2000-memory.dmp

                                    Filesize

                                    520KB