Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 21:50

General

  • Target

    7012be602b08edfbf8ba9bbb0a78b590_NeikiAnalytics.exe

  • Size

    8.4MB

  • MD5

    7012be602b08edfbf8ba9bbb0a78b590

  • SHA1

    3fb04fe68adc3a466d915a5ada209c4cb9baa09b

  • SHA256

    6c293ea8f03820bb8aa0a32d819fe52f278a11edba5d8ca640da6dcec3aadb71

  • SHA512

    3c47cceba6759001afcbbf569c05c0c429296cc8bb460e68950bf46b32ceb261fd3b4846445e94e8106a95e27dd7966f9a6356489eec6f38313a72b2c55c02ac

  • SSDEEP

    98304:5XbEhsqluBejQWFdSJ1y334JjlC5EsR9NjzdCH7W4U6IHTzIU2WDFTy0+lI:lWd9aJjlC5EsR9NHdCH7LU6SwlI

Malware Config

Extracted

Family

remcos

Botnet

RemBin

C2

maxlogs.webhop.me:1645

newnex.3utilities.com:5187

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remc.exe

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remc

  • mouse_option

    false

  • mutex

    Rmc-6UOSGH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7012be602b08edfbf8ba9bbb0a78b590_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7012be602b08edfbf8ba9bbb0a78b590_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2580
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp10E2.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2640
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\System32\svchost.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\vnwwblxlwrkycucyztaiklzixmp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1964
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\fhcptdifkzcdmaqkjembnqtrgthmem"
            5⤵
            • Accesses Microsoft Outlook accounts
            PID:1896
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\ibhhuwbgyhuqpgmoaphdydohhhqvxphnz"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remc\logs.dat

    Filesize

    146B

    MD5

    164ef2fb896c9410243e645e01951725

    SHA1

    8032202e4c601498c26414acc0d6e8e44caf7b2e

    SHA256

    7b1afaba9cbd29ba5585f6ed8457ae0456269915355560234fbc2dab089e91b4

    SHA512

    545ce21918c2d294004adfd6bc66c509793ce1c205826a9e67d25d4b40cceea9acd2965ce1c7bd44ea683f16a6d66cfb20a4d13492a5eefdb8b67c711dfcb8ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe9c6bfabefad2b20d74ad8da874c88a

    SHA1

    b4e17799cf5a7d9b3fc86aa61142c5c1bbd3c31a

    SHA256

    fa6c8ba72f8b83342e9376500066ebc06c9dbae2ea1bc8d87593df58249ce7db

    SHA512

    d0d266394353ac0c573d7ea2ade5576aaeb9b8ccb10756df256dfd617c2551bcc4ff7d1ea603fe867642c3aa45b1558de92e54e172152d348c545bd6d15fbef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67ddbafb49e878840abfe0b922ec379e

    SHA1

    ad8d0086b27e2577648cc578ed57d5a3e1314a6f

    SHA256

    4d3b108933ebf7f6abfa0256b0a0c99100dea6a7c38bf9bb404a15ab8912fda5

    SHA512

    cbe8902dacd92db3cec05ac790db57dab9a7b78df367eef93e74c949b7f6c4c34e7dfa1525fed56477d015485a0ed91c3645b316952764709ca56593c3f03245

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1f43466b99043254ec53c104f5289274

    SHA1

    447ed3155a7e35c6c5ea91236835c59687f3e76e

    SHA256

    69b7b868e2ae58cefa049642f3e012a5d36acde72bb876b8c8c466c2ed1890f5

    SHA512

    0f372938fa69943ac54a186ce31dbd959524d95c52ec6d6aed78089dee5cbb32ced2fb3a6e2567421f122c96e5f3946875f8eb57fca6df9ce79269a21ae7be9c

  • C:\Users\Admin\AppData\Local\Temp\Tar8A0C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp10E2.tmp.bat

    Filesize

    151B

    MD5

    802b17189f0da207a65eddbc3d03359b

    SHA1

    8c9fd3466774e9994b7dbe3c2880711145c72fd4

    SHA256

    4f920b5365e730a515dd0e64d892422457e839f551574c8352a4551fb36e31d6

    SHA512

    7b3534bc8b54f78270e60929bfadaa6d543805939ba1c910b522ccded78116e9837702ebd63e9d1657d1c6a78c195fe6daaa3549cab7b852a393411538497230

  • C:\Users\Admin\AppData\Local\Temp\vnwwblxlwrkycucyztaiklzixmp

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    8.4MB

    MD5

    7012be602b08edfbf8ba9bbb0a78b590

    SHA1

    3fb04fe68adc3a466d915a5ada209c4cb9baa09b

    SHA256

    6c293ea8f03820bb8aa0a32d819fe52f278a11edba5d8ca640da6dcec3aadb71

    SHA512

    3c47cceba6759001afcbbf569c05c0c429296cc8bb460e68950bf46b32ceb261fd3b4846445e94e8106a95e27dd7966f9a6356489eec6f38313a72b2c55c02ac

  • memory/1108-4-0x0000000000690000-0x00000000006AA000-memory.dmp

    Filesize

    104KB

  • memory/1108-0-0x00000000743DE000-0x00000000743DF000-memory.dmp

    Filesize

    4KB

  • memory/1108-14-0x00000000743D0000-0x0000000074ABE000-memory.dmp

    Filesize

    6.9MB

  • memory/1108-3-0x00000000056D0000-0x00000000057C2000-memory.dmp

    Filesize

    968KB

  • memory/1108-2-0x00000000743D0000-0x0000000074ABE000-memory.dmp

    Filesize

    6.9MB

  • memory/1108-1-0x0000000000B60000-0x00000000013C2000-memory.dmp

    Filesize

    8.4MB

  • memory/1896-135-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1896-137-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1896-131-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1964-134-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1964-128-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1964-136-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1964-129-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1984-133-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1984-138-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1984-139-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2596-18-0x0000000000DB0000-0x0000000001612000-memory.dmp

    Filesize

    8.4MB

  • memory/2596-19-0x0000000000600000-0x000000000061A000-memory.dmp

    Filesize

    104KB

  • memory/2728-31-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-38-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-35-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-32-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-25-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-33-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-34-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-22-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-43-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-21-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-20-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-42-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-36-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-26-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-164-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-165-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-167-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2728-171-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2728-170-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/2728-172-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-178-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-179-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-186-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-187-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-194-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2728-195-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB