Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 10:01

General

  • Target

    P.O_Qouts_t87E90Y-E4R7G-PDF.exe

  • Size

    636KB

  • MD5

    c1c571c4f8f69d3c8aa0ec091173bd5e

  • SHA1

    a36ac174f8ee2ed2254f69a21799837af58071f2

  • SHA256

    d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb

  • SHA512

    08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d

  • SSDEEP

    12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45.95.169.18:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-HP1D61

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Program Files (x86)\windows mail\wab.exe
        "C:\Program Files (x86)\windows mail\wab.exe"
        3⤵
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4792
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:4800
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\cfqqcfkbvdjwmwoibggbmeaicrwfcqzja"
          4⤵
            PID:4436
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\cfqqcfkbvdjwmwoibggbmeaicrwfcqzja"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3280
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nadad"
            4⤵
              PID:2900
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nadad"
              4⤵
              • Accesses Microsoft Outlook accounts
              • System Location Discovery: System Language Discovery
              PID:4608
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"
              4⤵
                PID:3448
              • C:\Program Files (x86)\windows mail\wab.exe
                "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"
                4⤵
                  PID:4196
                • C:\Program Files (x86)\windows mail\wab.exe
                  "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xuiteifw"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1512

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\remcos\logs.dat

            Filesize

            144B

            MD5

            5ad111ec2df070179346e4f43419bfb7

            SHA1

            5c6bad3bc3b4bd20374c44292300a83d3b372e4a

            SHA256

            5285092faff2182ff5fb33e95423603145b780834691190b1b9f45b10dab420c

            SHA512

            5c3697eef17e7de611ee403f943ad6c788b82cc9dd79c480817a8cfe712447076333c519f9e9170a971dc24f962ca4b3a354f71926083461e28dbbbba37498c9

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_giomm2jp.dta.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\cfqqcfkbvdjwmwoibggbmeaicrwfcqzja

            Filesize

            4KB

            MD5

            c0ab2847671ed5375328c5127a02cc72

            SHA1

            dc2bcb51562fb17e5c8787833bc0181d88a5b75e

            SHA256

            e961f466a0638bc99182d0056245e2d8bf1ccc13a189b802aada981f379e2384

            SHA512

            0b8b634d21ac71e02cef86687bf84b6fcecfd24dafab8130f42ce8b4b3f308a2e1b1fa7bf8d37f2eda76efae2b30b8d39f41d808d771562d8545ed144241924f

          • C:\Users\Admin\AppData\Local\Temp\nsv6E7A.tmp\nsDialogs.dll

            Filesize

            9KB

            MD5

            eb2c74e05b30b29887b3219f4ea3fdab

            SHA1

            91173d46b34e7bae57acabdbd239111b5bcc4d9e

            SHA256

            d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed

            SHA512

            1bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae

          • C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Stenotypistens.Udk

            Filesize

            364KB

            MD5

            4f7bc22100b0ce9f5392bb0b43ab22c9

            SHA1

            322f410d7c94a5f400656e1c49b5d4cef6dde8f2

            SHA256

            67e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a

            SHA512

            dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b

          • C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy

            Filesize

            54KB

            MD5

            4bb55c98fcfab7c0706cf43af638c89e

            SHA1

            58f5ec920e25fa95c47a826e34736d1159232efd

            SHA256

            fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d

            SHA512

            591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27

          • memory/1512-67-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/1512-68-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/1512-72-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2220-78-0x0000000022690000-0x00000000226A9000-memory.dmp

            Filesize

            100KB

          • memory/2220-105-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-90-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-84-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-81-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-79-0x0000000022690000-0x00000000226A9000-memory.dmp

            Filesize

            100KB

          • memory/2220-93-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-53-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-96-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-75-0x0000000022690000-0x00000000226A9000-memory.dmp

            Filesize

            100KB

          • memory/2220-99-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-102-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-50-0x0000000077831000-0x0000000077951000-memory.dmp

            Filesize

            1.1MB

          • memory/2220-87-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-51-0x00000000778B8000-0x00000000778B9000-memory.dmp

            Filesize

            4KB

          • memory/2220-52-0x0000000077831000-0x0000000077951000-memory.dmp

            Filesize

            1.1MB

          • memory/2220-54-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-111-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/2220-108-0x00000000012A0000-0x00000000024F4000-memory.dmp

            Filesize

            18.3MB

          • memory/3280-65-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3280-63-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/3280-61-0x0000000000400000-0x0000000000478000-memory.dmp

            Filesize

            480KB

          • memory/4608-66-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/4608-64-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/4608-62-0x0000000000400000-0x0000000000462000-memory.dmp

            Filesize

            392KB

          • memory/4952-32-0x0000000006A40000-0x0000000006A62000-memory.dmp

            Filesize

            136KB

          • memory/4952-49-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-59-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-47-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-46-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-45-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-44-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-43-0x0000000008DD0000-0x000000000D00F000-memory.dmp

            Filesize

            66.2MB

          • memory/4952-42-0x0000000073BDE000-0x0000000073BDF000-memory.dmp

            Filesize

            4KB

          • memory/4952-41-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-39-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-38-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-37-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-35-0x0000000008750000-0x0000000008DCA000-memory.dmp

            Filesize

            6.5MB

          • memory/4952-33-0x0000000007B20000-0x00000000080C4000-memory.dmp

            Filesize

            5.6MB

          • memory/4952-30-0x0000000006AE0000-0x0000000006B76000-memory.dmp

            Filesize

            600KB

          • memory/4952-31-0x00000000069D0000-0x00000000069EA000-memory.dmp

            Filesize

            104KB

          • memory/4952-29-0x0000000006510000-0x000000000655C000-memory.dmp

            Filesize

            304KB

          • memory/4952-28-0x00000000064E0000-0x00000000064FE000-memory.dmp

            Filesize

            120KB

          • memory/4952-23-0x0000000005E60000-0x00000000061B4000-memory.dmp

            Filesize

            3.3MB

          • memory/4952-16-0x00000000055C0000-0x0000000005626000-memory.dmp

            Filesize

            408KB

          • memory/4952-17-0x0000000005C70000-0x0000000005CD6000-memory.dmp

            Filesize

            408KB

          • memory/4952-15-0x0000000005520000-0x0000000005542000-memory.dmp

            Filesize

            136KB

          • memory/4952-14-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-12-0x0000000073BD0000-0x0000000074380000-memory.dmp

            Filesize

            7.7MB

          • memory/4952-13-0x0000000005640000-0x0000000005C68000-memory.dmp

            Filesize

            6.2MB

          • memory/4952-11-0x0000000002BF0000-0x0000000002C26000-memory.dmp

            Filesize

            216KB

          • memory/4952-10-0x0000000073BDE000-0x0000000073BDF000-memory.dmp

            Filesize

            4KB