Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 16:31

General

  • Target

    a.exe

  • Size

    453KB

  • MD5

    02d693c186871b0aba2101233ee64173

  • SHA1

    f5786f6346286e9e61f2c4cde7cf0dd877d103da

  • SHA256

    ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c

  • SHA512

    aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768

  • SSDEEP

    12288:Emnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSbn9:8iLJbpI7I2WhQqZ7b9

Malware Config

Extracted

Family

remcos

Botnet

New

C2

173.212.217.108:1050

zab4ever.no-ip.org:1050

1zab4ever.no-ip.org:1050

1zab4ever.duckdns.org:1050

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    BrowseUpdt.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    nobita.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    khruioprs-T021C4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    BrowseUpdt

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a.exe
    "C:\Users\Admin\AppData\Local\Temp\a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe
          C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2840
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            5⤵
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              6⤵
                PID:2640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs

      Filesize

      412B

      MD5

      983609782eefdfb08a07ef630996dc0c

      SHA1

      47d060bf4d7ce66d807aa246e4a78ce3c1ac29b0

      SHA256

      38b85ad30d0626119e9e2f40b5b5a4279ae2f1929bf623083568cd3b1c3bf935

      SHA512

      ebadf7e339214da369e25ab6ca2bc19799d99e2e4fffc9b79d57e747eacdb62aa3fd41d1efae4250ac0536a0b60e541b4a5b2323ea59c09f2fdb8fdee248733d

    • C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe

      Filesize

      453KB

      MD5

      02d693c186871b0aba2101233ee64173

      SHA1

      f5786f6346286e9e61f2c4cde7cf0dd877d103da

      SHA256

      ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c

      SHA512

      aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768

    • memory/2588-19-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-29-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-16-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-13-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-12-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-36-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-34-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-32-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-11-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-25-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-26-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-27-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-28-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2588-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2588-30-0x00000000000C0000-0x000000000013B000-memory.dmp

      Filesize

      492KB

    • memory/2640-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2640-22-0x0000000000080000-0x00000000000FB000-memory.dmp

      Filesize

      492KB

    • memory/2640-21-0x0000000000080000-0x00000000000FB000-memory.dmp

      Filesize

      492KB