Analysis

  • max time kernel
    1354s
  • max time network
    1143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 20:30

General

  • Target

    Remcos v5.1.3 Light.exe

  • Size

    38.4MB

  • MD5

    1a787dacd4ac908241f677303af69d6f

  • SHA1

    fa57edb0b2e21e8a55602cb96809efcfcfee65c1

  • SHA256

    4098c759068a197e9b5236af09fc8344da2d0d8d8a3fd4c17824160b1afea5a0

  • SHA512

    a6d0a770e9c425fa9f28a99e81a4f630c362692b9c4c623963871b2de992f5e10c035e1d23e1e8dbcd729777fa630801bf4998f7d83d245d353470353d71b650

  • SSDEEP

    786432:WIXQNSBAVi1Bs2DuYr3jxkQNk58issVWhJDS3IWgrAfUPE+szJFjU:WIXQgAVi1eQ3jnm8ihADnrAuE3HA

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remcos v5.1.3 Light.exe
    "C:\Users\Admin\AppData\Local\Temp\Remcos v5.1.3 Light.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1504
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2532
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 2880
        2⤵
        • Program crash
        PID:2000
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
      1⤵
      • Drops file in Windows directory
      PID:3388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3848 -ip 3848
      1⤵
        PID:1248
      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\CheckpointSearch.xlsx"
        1⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1696
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DisableAdd.mp4v"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:220

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        512KB

        MD5

        b329979a534a47e4381448265b867bb0

        SHA1

        8623145d1f06430662a2304e50cff646b7551d2e

        SHA256

        5f785ceee7336194384e68adb44509ee2787857786c15b58f054024543b423f3

        SHA512

        b2359a8740387142a603e3b84e6da9771f67eda3346b60a7cba0a52882ea5f8eca0abf8006143f0975ba3617b26897c3fe22822852a210883c213a20c8fb8346

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

        Filesize

        1024KB

        MD5

        49c8a0bd4e95b7f0d0a0cbd7b24fb59f

        SHA1

        9cd7b808fbf0ee6e1024efba2ff322f453b997e7

        SHA256

        2f48a8fc3202a92a645d28ce39eeee6fdbc055ade7354345a6f5f086dc4925ce

        SHA512

        6288d72fa2eca4da0818c3ddc706406e28f468eda7707d67a35ce544417d3df3f75e0ea1a71f5db2b2e013613a4c9ef584eccedd168dd930c2f7162320432e6d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

        Filesize

        498B

        MD5

        90be2701c8112bebc6bd58a7de19846e

        SHA1

        a95be407036982392e2e684fb9ff6602ecad6f1e

        SHA256

        644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

        SHA512

        d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

        Filesize

        9KB

        MD5

        5433eab10c6b5c6d55b7cbd302426a39

        SHA1

        c5b1604b3350dab290d081eecd5389a895c58de5

        SHA256

        23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

        SHA512

        207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        1KB

        MD5

        f8403ed9075e0883edb7958948eaa4b9

        SHA1

        29988b20df01d4304fd6d52929e1d458b69e11ac

        SHA256

        edc1582fbd70eb0dfe120f23751cff4b1b24d3509eb44723a975896633d1ad16

        SHA512

        365eda5e6eccc55349ce02e84adaf58b694668452ff020b5ff22336dc7bf603649e1d353c7716c9f2f58e2c304fd20bd70560c4fc07f50fcfc95aec3662bc353

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        385B

        MD5

        f3baa24b9005b64655aabfc7847acb6b

        SHA1

        8f38ff6290a99ce782dabee3589f7dadc55610ee

        SHA256

        82133c648058213d2f8c3520bf92daefaed4f47b114fb8b0040d484ffa13a6de

        SHA512

        7323dc399dcb3b729fd315fdcd089604d9b88ec283b14d4b9357972b53f9abdc475498d78c9b9fd84762354fd451f99494d5d308f2ce7675447ce9c7b6495155

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        1KB

        MD5

        0b744564abbf513296c66c0a04d1e4a4

        SHA1

        97b400ff5a5a0f15cc97c2a0455cb4988a723637

        SHA256

        4eab2916eeb89c88097d3b69983543cd358f1391ba1cf267a9e0c89ccfe3922f

        SHA512

        04767aa1ada78c0de87a2923d9e7e6397a99d2413149767a557f7d26d4dfc420852a7d72b49bc436e15eb84d28fe3d547b58e9a2617beca25f0bfa81affe35cd

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms

        Filesize

        3KB

        MD5

        3cfab9e1b83bf8a27d4233ce7ee082f7

        SHA1

        54dd2d24ba0b0cc3d4ab4e1a208125c727b08383

        SHA256

        340cd6517496e0535278e5862b1e0e4fa2fbb572b9e7c4da0714ee4d6bfe9136

        SHA512

        46173d6d1d0319351bf782034e3ea2f52185b00648c9f501de06b3f03ef4f0cd7844c67b866854aedde098cc08d052b6d6575c49faa2302e78b1b0875645d071

      • memory/220-129-0x00007FF667970000-0x00007FF667A68000-memory.dmp

        Filesize

        992KB

      • memory/220-130-0x00007FF954820000-0x00007FF954854000-memory.dmp

        Filesize

        208KB

      • memory/220-131-0x00007FF943F30000-0x00007FF9441E6000-memory.dmp

        Filesize

        2.7MB

      • memory/220-132-0x00007FF942480000-0x00007FF943530000-memory.dmp

        Filesize

        16.7MB

      • memory/1504-9-0x0000000000400000-0x000000000658D000-memory.dmp

        Filesize

        97.6MB

      • memory/1504-2-0x0000000006760000-0x0000000006761000-memory.dmp

        Filesize

        4KB

      • memory/1504-14-0x0000000000400000-0x000000000658D000-memory.dmp

        Filesize

        97.6MB

      • memory/1504-13-0x0000000000400000-0x000000000658D000-memory.dmp

        Filesize

        97.6MB

      • memory/1504-12-0x0000000000400000-0x000000000658D000-memory.dmp

        Filesize

        97.6MB

      • memory/1504-0-0x0000000000401000-0x000000000083A000-memory.dmp

        Filesize

        4.2MB

      • memory/1504-1-0x0000000006740000-0x0000000006741000-memory.dmp

        Filesize

        4KB

      • memory/1504-6-0x0000000008470000-0x0000000008471000-memory.dmp

        Filesize

        4KB

      • memory/1504-4-0x0000000006780000-0x0000000006781000-memory.dmp

        Filesize

        4KB

      • memory/1504-3-0x0000000006770000-0x0000000006771000-memory.dmp

        Filesize

        4KB

      • memory/1504-5-0x00000000067A0000-0x00000000067A1000-memory.dmp

        Filesize

        4KB

      • memory/1504-8-0x0000000008490000-0x0000000008491000-memory.dmp

        Filesize

        4KB

      • memory/1504-7-0x0000000008480000-0x0000000008481000-memory.dmp

        Filesize

        4KB

      • memory/1504-15-0x0000000000400000-0x000000000658D000-memory.dmp

        Filesize

        97.6MB

      • memory/1696-69-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-71-0x00007FF920430000-0x00007FF920440000-memory.dmp

        Filesize

        64KB

      • memory/1696-70-0x00007FF920430000-0x00007FF920440000-memory.dmp

        Filesize

        64KB

      • memory/1696-108-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-109-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-111-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-110-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-68-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-66-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-67-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB

      • memory/1696-65-0x00007FF922BF0000-0x00007FF922C00000-memory.dmp

        Filesize

        64KB