Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 22:14

General

  • Target

    e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe

  • Size

    469KB

  • MD5

    1f532632777673e522d5c17cd4aed0c0

  • SHA1

    707964883b3168810be0f977e54c7db09fed3668

  • SHA256

    e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181

  • SHA512

    f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce

  • SSDEEP

    12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQS2n9:WiLJbpI7I2WhQqZ729

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

accessories-retrieve.gl.at.ply.gg:13970

accessories-retrieve.gl.at.ply.gg:9999

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Solara2.exe

  • copy_folder

    Health

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    filer32

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    Rmc-X97XC1

  • screenshot_crypt

    true

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %WinDir%\System32

  • screenshot_time

    10

  • startup_value

    WindowsHealth

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe
    "C:\Users\Admin\AppData\Local\Temp\e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\SysWOW64\cmd.exe
      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • UAC bypass
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:2620
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\Health\Solara2.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\SysWOW64\Health\Solara2.exe
          C:\Windows\SysWOW64\Health\Solara2.exe
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Windows\SysWOW64\cmd.exe
            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3736
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • UAC bypass
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:1108
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            5⤵
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3732
            • C:\Windows\SysWOW64\cmd.exe
              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3812
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                7⤵
                • UAC bypass
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\install.vbs

    Filesize

    638B

    MD5

    366dd9ed14f99a7094ae5da81eb2c5f0

    SHA1

    7bb0c900bd8f11adb7c5b6f0cde85c58833a59a3

    SHA256

    57f9bcc5b53ac9aaba8275ffcbfe42e9c8f082bacfec7cdca5eb3642b5ea8184

    SHA512

    598d4c9057486d2e13361c831bb9ea88fbc319d6ba5d080d2f92831d364bdd4d21a341121dc7189ff61d36ff578fa4d54e716bc58aec4ecea165fd8cbce96c6b

  • C:\Windows\SysWOW64\Health\Solara2.exe

    Filesize

    469KB

    MD5

    1f532632777673e522d5c17cd4aed0c0

    SHA1

    707964883b3168810be0f977e54c7db09fed3668

    SHA256

    e63b5f8bfd7ef1d06b57fef57e2704592b003a653d132844abf776e2e0752181

    SHA512

    f5772edfe378b1f283d449c515dc8d36609a017745b8395968681efc1de7e0a3b9fc0c69b193b15c39ea44b9f1163355861fa5000e2fb1ab3734dc20250576ce

  • C:\Windows\SysWOW64\filer32\logs.dat

    Filesize

    184B

    MD5

    57cc637d92e17ffdc045c86f924140d4

    SHA1

    0fce8238e85cf0c2ea2664758a1c862657d4f683

    SHA256

    abeaef916c4acb64edb5aa2432a5ce53367121403f3140e7f34dae8d87c96efc

    SHA512

    a559e0e4940e17563ab6fee2ba5fa8dec7218ebc421189556eb28bc11c0b424efcc049140c333e450bd4e4b28208db43cdeb8cf66a1e91a2d78b81793061c2cd

  • memory/3732-29-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-36-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-15-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-16-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-10-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-23-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-24-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-9-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-30-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-11-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-35-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-42-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-43-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-48-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-49-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-54-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB

  • memory/3732-55-0x00000000005C0000-0x000000000063F000-memory.dmp

    Filesize

    508KB