Analysis

  • max time kernel
    419s
  • max time network
    421s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 16:00

General

  • Target

    ezyzip.zip

  • Size

    5.9MB

  • MD5

    100aabac8fd8766ba396a03ec81387dc

  • SHA1

    e6250df08d0582688a06b0fc3d84a27cc5a29feb

  • SHA256

    cbaf643a15c5a72bb396eaf1ff247b9ad1862271c1b35765851b39220102cde7

  • SHA512

    bbd39ed1168de1dca7331a1647ba8218b687a9486928a54a9b38b7e53a36042721667e4d730fde0b450868e372e8b73e54417c95e414e3fbadf6427ac4b1bdce

  • SSDEEP

    98304:SmMetA4nLjnWWL62vL+kqYv+3DNxTmDqBxVpdgTvM5TtcMTVBJlTbXfS69UH:SmTjWWzyZxyqBxLm05GGzJlTp9+

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

privmerkt.com:8922

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-LAI9XP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ezyzip.zip
    1⤵
      PID:548
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2832
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\ezyzip\" -spe -an -ai#7zMap26113:92:7zEvent26993
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2056
      • C:\Users\Admin\AppData\Local\Temp\ezyzip\2023 TRISHA ORGANIZERpdf.exe
        "C:\Users\Admin\AppData\Local\Temp\ezyzip\2023 TRISHA ORGANIZERpdf.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3304
        • C:\Users\Admin\AppData\Local\Temp\ezyzip\2023 TRISHA ORGANIZERpdf.exe
          "C:\Users\Admin\AppData\Local\Temp\ezyzip\2023 TRISHA ORGANIZERpdf.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3588
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f & exit
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f
            3⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:5088

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ezyzip\2023 TRISHA ORGANIZERpdf.exe

        Filesize

        6.1MB

        MD5

        4864a55cff27f686023456a22371e790

        SHA1

        6ed30c0371fe167d38411bfa6d720fcdcacc4f4c

        SHA256

        08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2

        SHA512

        4bd3a16435cca6ce7a7aa829eb967619a8b7c02598474e634442cffc55935870d54d844a04496bf9c7e8c29c40fae59ac6eb39c8550c091d06a28211491d0bfb

      • C:\Users\Admin\AppData\Local\Temp\ezyzip\msimg32.dll

        Filesize

        6.3MB

        MD5

        6c1d68c7960415c632429da5aa258062

        SHA1

        c4de42e1b1de043c1a4224eacbd429d4fbef5764

        SHA256

        5b9c3d8a7377aa103f13a12bbd81f9d833de987e1a39da3d1b30ef4a30437cfa

        SHA512

        5d3b250636bc6ee96f4b3329a29d0d4b7cbebbcf7f7ed325725b2cbd9830d51f843b472b55f5c34845f90c69fe7f80e803e44b0142df443ab5c53b2af4805e86

      • memory/3588-7-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-11-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-9-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-12-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-13-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-15-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-16-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-17-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-18-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-19-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-20-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-21-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-22-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-23-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-24-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-25-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-26-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-27-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-28-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-29-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-30-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-31-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-32-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-33-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-34-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-35-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-36-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-37-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-38-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-39-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-40-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-41-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-42-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-43-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-44-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-45-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-46-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-47-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-48-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-49-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-50-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-51-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-52-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-53-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-54-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-55-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-56-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-57-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-58-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-59-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-60-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-61-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-62-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-63-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-64-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-65-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-66-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-67-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-68-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-69-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-70-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-71-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB

      • memory/3588-72-0x0000000000A30000-0x0000000000AB2000-memory.dmp

        Filesize

        520KB