Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 12:02

General

  • Target

    Quotation.exe

  • Size

    1.4MB

  • MD5

    1e006059f3779403444376d213c89e77

  • SHA1

    c9e293129de50f5f8f7fae3cd75c7d726c8ed18a

  • SHA256

    bb6203484b80acc69bffa9a963f3f661d3d02347f3189b7a2ef290ca48608005

  • SHA512

    293304ec52f1ad6e7c424c2d8403702ebefcc92929401b7f83795df0597406df084275933b7ab2fa2778a54372e08be6603ca1a474e46b51430542dac2a6526b

  • SSDEEP

    24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aSmJAxSoV9m3E2A/:yTvC/MTQYxsWR7aSDSLE2

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

PTR

C2

profonudcommrce.com:30902

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    chrome-LVLUXQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\directory\chrome.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    bbfcc0b517121ed1642bfec5b7266b77

    SHA1

    f6c74522bcf3be488cbb468436cf812ab80ac09e

    SHA256

    66cc08ff79a04f97ff077e7076049b0227cd9e5a405cd2d5013503201bacc6bc

    SHA512

    f489c91b2b9ee39766142e61cd41c266873e7707c260ad4d5c1480cef6f461f82f7c18155fab3568ec2a398ede4d655880007e0602ecea0b995c832e2fe61123

  • C:\Users\Admin\AppData\Local\Temp\caulds

    Filesize

    84KB

    MD5

    73b52971e55ea55fc6fca6ff9f26e6e0

    SHA1

    2d4ad4dad7baa519ff032eeeba2969d5a0bcb18d

    SHA256

    3e257b674e8d3eb8686c58d17683ad669c8a040f39b5fd4baf96da9314b0af34

    SHA512

    c210cb16606775297b150ed09beb90285c21d2b05e4a7a86e54525c2589cff9c0ec29f8519c1a1fc8dabeea1ed59af9d76423888d0e0133eb001e706d46f2f9c

  • C:\Users\Admin\AppData\Local\directory\chrome.exe

    Filesize

    1.4MB

    MD5

    1e006059f3779403444376d213c89e77

    SHA1

    c9e293129de50f5f8f7fae3cd75c7d726c8ed18a

    SHA256

    bb6203484b80acc69bffa9a963f3f661d3d02347f3189b7a2ef290ca48608005

    SHA512

    293304ec52f1ad6e7c424c2d8403702ebefcc92929401b7f83795df0597406df084275933b7ab2fa2778a54372e08be6603ca1a474e46b51430542dac2a6526b

  • memory/3340-30-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-32-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-34-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-35-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-36-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-38-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-39-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-41-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-42-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-43-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-45-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-46-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-47-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-49-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-50-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-51-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-54-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-55-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-57-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-58-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-61-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-62-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-65-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-66-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-69-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-70-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-72-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-73-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-75-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-76-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-78-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-79-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-81-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-83-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-84-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-85-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-87-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-89-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-91-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-92-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-94-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-95-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-96-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-98-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-99-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-100-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-102-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-103-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-105-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-106-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-108-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-109-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-111-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-112-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-115-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3340-116-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3396-11-0x0000000000BB0000-0x0000000000BB4000-memory.dmp

    Filesize

    16KB