Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 15:22

General

  • Target

    invoice-QW7008660.exe

  • Size

    1.3MB

  • MD5

    d1d7a28422449d00071aee08f983ed7a

  • SHA1

    a60732a9bf48716a7853cede3f40d07408992088

  • SHA256

    3696fbaef6eb9a52fcad65eb7743ecb0047082d62b43ba72301d63467b7483ff

  • SHA512

    f10f9e09aa2e0d007e655601d2d9f555cd96cbc84344a81ed832524130b360f1db3575469dad91b6a64309743c585ff5029d3b2ab89517d0defe56a74dba0909

  • SSDEEP

    24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8aP/BiA8NUa8AtmAwRLYqan:vTvC/MTQYxsWR7aP54wR

Malware Config

Extracted

Family

remcos

Botnet

APPO

C2

pronpostavka.com:2559

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    chrome-EZMR6Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\invoice-QW7008660.exe
    "C:\Users\Admin\AppData\Local\Temp\invoice-QW7008660.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice-QW7008660.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\invoice-QW7008660.exe"
        3⤵
          PID:2220
        • C:\Users\Admin\AppData\Local\directory\name.exe
          "C:\Users\Admin\AppData\Local\directory\name.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:376
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Users\Admin\AppData\Local\directory\name.exe"
            4⤵
              PID:2480
            • C:\Users\Admin\AppData\Local\directory\name.exe
              "C:\Users\Admin\AppData\Local\directory\name.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4000
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Users\Admin\AppData\Local\directory\name.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                PID:388

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\autCC1A.tmp

        Filesize

        384KB

        MD5

        7d92f803c1196263066a569a440c53fc

        SHA1

        03124322feb322dd2149a16e2b88b2b6af482eee

        SHA256

        a45dd96fdd8da53a72e69726a6ebe850dca44ef621cba58613cb3d878383108a

        SHA512

        1b5ee66547ae2b130e9d73c6f77b32a512be667a4025c9899ca06acdb44cc950837a6859e391c22b025ba5c46dfae4fd65fa88d6a21353397988ebcd54f836af

      • C:\Users\Admin\AppData\Local\Temp\autCC2A.tmp

        Filesize

        42KB

        MD5

        c1788898bf1f2eac400caf221bedea62

        SHA1

        557aa2960e5d8e96b6d8385ee6595406f1845a06

        SHA256

        f9f2fa24ad086a259ffca794fcffe4b3c45aea6e94da4d61715cf73401d183d7

        SHA512

        8015b96847246fdc4c8c27b6ae89e0cafbf0e26867702d84c27d93e6f233f23521380a9440118ceb2340aa9b9562050e4c9e21dcbf4979d40e7f8053c5cc7ff7

      • C:\Users\Admin\AppData\Local\Temp\phagocytosed

        Filesize

        84KB

        MD5

        aa137d5b4ef8805e180303ff0dc919e2

        SHA1

        be7892a97b7e6a073ea434b592f07802efa7afa8

        SHA256

        6814368cc8b7c68fe4f6514ca809dada738cedff57d82170c90950b0ef5730d5

        SHA512

        dcbba739a6efa1a42df9596a7de014829b5a558185ae5449cd91c6e9445f03f3411dc855a6113d659d5a73d7d0cc10a90c48d6b9337ae41a5085e46cf469896c

      • C:\Users\Admin\AppData\Local\Temp\silvexes

        Filesize

        483KB

        MD5

        b27831241b28f16b35bf280906c89f6b

        SHA1

        ee7a38d75d11a58eea6a6c27a9aea7c3de5f52bd

        SHA256

        5b2bbe9b609a5d13a2f536fcad9c3aa4dfa35d1cdd3ee79cddc123de1a95f783

        SHA512

        e73161a99ef9a967f56d7b8257a6265bd7e8c061c06124ec2619a8e34b40c73710572f1a46bb6fe3d9b9710928bd645931b24fb381e792131ba41fc531df6d69

      • C:\Users\Admin\AppData\Local\directory\name.exe

        Filesize

        1.3MB

        MD5

        d1d7a28422449d00071aee08f983ed7a

        SHA1

        a60732a9bf48716a7853cede3f40d07408992088

        SHA256

        3696fbaef6eb9a52fcad65eb7743ecb0047082d62b43ba72301d63467b7483ff

        SHA512

        f10f9e09aa2e0d007e655601d2d9f555cd96cbc84344a81ed832524130b360f1db3575469dad91b6a64309743c585ff5029d3b2ab89517d0defe56a74dba0909

      • memory/388-64-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-70-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-59-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-60-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-61-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-62-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-63-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-80-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-67-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-68-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-69-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-58-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-71-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-72-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-73-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-74-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-75-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-76-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-77-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-78-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/388-79-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/640-11-0x0000000001180000-0x0000000001184000-memory.dmp

        Filesize

        16KB