Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2024, 22:14

General

  • Target

    e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe

  • Size

    469KB

  • MD5

    1f532632777673e522d5c17cd4aed0c0

  • SHA1

    707964883b3168810be0f977e54c7db09fed3668

  • SHA256

    e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181

  • SHA512

    f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce

  • SSDEEP

    12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS2n9:WiLJbpI7I2WhQqZ729

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

accessories-retrieve.gl.at.ply.gg:13970

accessories-retrieve.gl.at.ply.gg:9999

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Solara2.exe

  • copy_folder

    Health

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    filer32

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    Rmc-X97XC1

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %WinDir%\System32

  • screenshot_time

    10

  • startup_value

    WindowsHealth

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe
    "C:\Users\Admin\AppData\Local\Temp\e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2832
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\Health\Solara2.exe"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\Health\Solara2.exe
          C:\Windows\SysWOW64\Health\Solara2.exe
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\SysWOW64\cmd.exe
            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • UAC bypass
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:2624
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            5⤵
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Windows\SysWOW64\cmd.exe
              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                7⤵
                • UAC bypass
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\install.vbs

          Filesize

          638B

          MD5

          366dd9ed14f99a7094ae5da81eb2c5f0

          SHA1

          7bb0c900bd8f11adb7c5b6f0cde85c58833a59a3

          SHA256

          57f9bcc5b53ac9aaba8275ffcbfe42e9c8f082bacfec7cdca5eb3642b5ea8184

          SHA512

          598d4c9057486d2e13361c831bb9ea88fbc319d6ba5d080d2f92831d364bdd4d21a341121dc7189ff61d36ff578fa4d54e716bc58aec4ecea165fd8cbce96c6b

        • C:\Windows\SysWOW64\filer32\logs.dat

          Filesize

          184B

          MD5

          83ecc186dc788e1203ddfe01edf1ce44

          SHA1

          55f5d89203f6754467e2d7d2d442bf286ce4add3

          SHA256

          85fe269e94a75df732b5786ff65fdb5c0faaa0cc52c942f71e46fcf866d5a0cf

          SHA512

          8a641d009825b0588afb6855dede41f79e5a41355baffac3b0fce132650f0d93d6d4c667bd4f53e9caf134659ee10cc1d036c2b83bec9a5241eddd42a350de62

        • \Windows\SysWOW64\Health\Solara2.exe

          Filesize

          469KB

          MD5

          1f532632777673e522d5c17cd4aed0c0

          SHA1

          707964883b3168810be0f977e54c7db09fed3668

          SHA256

          e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181

          SHA512

          f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce

        • memory/2820-25-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-32-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-13-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-17-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-18-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-12-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-26-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-11-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-31-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2820-37-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-38-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-44-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-45-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-50-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-51-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-56-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB

        • memory/2820-57-0x0000000000270000-0x00000000002EF000-memory.dmp

          Filesize

          508KB