Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 07:56

General

  • Target

    Request for Quotation.exe

  • Size

    942KB

  • MD5

    81f320c7d5f344ae0ddd2b05c69efb78

  • SHA1

    dcfae138ee23d9cea53a052cfe3c42e87c1873e5

  • SHA256

    de99d33baf08708519ab2d9dc15635280482b2b21e52653b8786a6eb34c2f262

  • SHA512

    cb94f64fd7979917ba1d32a3966e22e9afce0766f58cf15e23a7f1a00d6b2f7cfd1e9b07edcd4c76e7471d89690d142e1ddaa23ea09d95b0f9eb17517d9189e7

  • SSDEEP

    24576:BYeOKhefMa86dA+CPcwh/6s7TNNuS6UEtvqsX+ES:2trdsEE/6mNNuS6UEtvHO

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

eadzagba1.duckdns.org:4877

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-X3UMUO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2868
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ToHYZKAyCCa.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ToHYZKAyCCa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB339.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2136
    • C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe
      "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpB339.tmp

    Filesize

    1KB

    MD5

    66df24304a56908ca7df16228e7e66e8

    SHA1

    872239db3cb40f6427e3809515ebb5240426302e

    SHA256

    66ac22fdada4b24319b8e0176cfbd54aaf6d65557c4e46ea64fc585964484543

    SHA512

    2ca4e7053c817de14b46ec4f53aee48a6f9503d8c697726a6953407b751923904583340b059ecd08e93b5086c6140d4e3d46a8a091d14ec6fb919d1ce2b1d73a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    fe36c3fe82f0e90e8d1bbab2a3224d9c

    SHA1

    da753849266002222c3bdef22797084cb9dc47ce

    SHA256

    f31fbcc1169edfeb052b3d1611f616dc8978cce376c44a801d4390b01c9a5b18

    SHA512

    ba3a9d612d8726ac01f4edd2e6fe684de288d1c519fb349e38583a4bae9c9ca29a98e84fb21f6665b8c6f50dd94c309e69b7bb869c02191e708766cddd322e29

  • memory/1744-39-0x0000000074270000-0x000000007495E000-memory.dmp

    Filesize

    6.9MB

  • memory/1744-1-0x0000000000D80000-0x0000000000E72000-memory.dmp

    Filesize

    968KB

  • memory/1744-3-0x0000000000460000-0x000000000047A000-memory.dmp

    Filesize

    104KB

  • memory/1744-2-0x0000000074270000-0x000000007495E000-memory.dmp

    Filesize

    6.9MB

  • memory/1744-4-0x0000000000240000-0x000000000024E000-memory.dmp

    Filesize

    56KB

  • memory/1744-5-0x0000000000480000-0x0000000000496000-memory.dmp

    Filesize

    88KB

  • memory/1744-6-0x0000000000AD0000-0x0000000000B90000-memory.dmp

    Filesize

    768KB

  • memory/1744-0-0x000000007427E000-0x000000007427F000-memory.dmp

    Filesize

    4KB

  • memory/2780-31-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-34-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-24-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-37-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-36-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2780-19-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-29-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-27-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-25-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-21-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-38-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-40-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-41-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-42-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-43-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-46-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-47-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-48-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-50-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-51-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-52-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2780-53-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB