Analysis

  • max time kernel
    244s
  • max time network
    303s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 19:06

General

  • Target

    1 ORGANIZER MARY 2023 COMPILED PDF.exe

  • Size

    6.1MB

  • MD5

    4864a55cff27f686023456a22371e790

  • SHA1

    6ed30c0371fe167d38411bfa6d720fcdcacc4f4c

  • SHA256

    08c7fb6067acc8ac207d28ab616c9ea5bc0d394956455d6a3eecb73f8010f7a2

  • SHA512

    4bd3a16435cca6ce7a7aa829eb967619a8b7c02598474e634442cffc55935870d54d844a04496bf9c7e8c29c40fae59ac6eb39c8550c091d06a28211491d0bfb

  • SSDEEP

    98304:VZQIM+/nv/CDoAkYwpAa5ge1zZ/jtdZwUkQ:bJCKlA2VKUz

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

privmerkt.com:8922

nwemarkets.com:5552

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-TA78E3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1 ORGANIZER MARY 2023 COMPILED PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\1 ORGANIZER MARY 2023 COMPILED PDF.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Local\Temp\1 ORGANIZER MARY 2023 COMPILED PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\1 ORGANIZER MARY 2023 COMPILED PDF.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\build.exe
          "C:\Users\Admin\AppData\Local\Temp\build.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ophhlrf.vbs"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\crcqdprlykhgjmuvghxbpaiqabxeq.vbs"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:1020
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4968
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2236
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4256
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        PID:3568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\build.exe

      Filesize

      4.2MB

      MD5

      979bea168beb5fef43c775cf31632c53

      SHA1

      c16509b69ee617ff0324a538539c2ed9aadeda4d

      SHA256

      675fc1d5e9a46f083a088ba32815eb191464ee29ecedc4b50b7ab577597844aa

      SHA512

      f08db793dca0bc7dd2934f055f5e308485be0f34d7a0c9ff74a604014bf5c54bb063d00f0f037a7efacd8c03a8fcdbc131a8d3c1df30fc5bd046a7b17800f7c7

    • C:\Users\Admin\AppData\Local\Temp\crcqdprlykhgjmuvghxbpaiqabxeq.vbs

      Filesize

      608B

      MD5

      980bbd66ef96c65450db06d5617e2ada

      SHA1

      d4c5349293015e0609814bd6130bce5ce6936ea9

      SHA256

      27ccb3b58cb1d102717ec24d1084a003ea27057f6dc5b00a694a02bf88347b96

      SHA512

      54123136c4627683d1b87c593d14e7579e7dd1172f5a125d3d6304a213bfdd54c33781ba356b901fc2dd94da9b8e67da133272d9e6a6445cbb7008966fcc536e

    • C:\Users\Admin\AppData\Local\Temp\ophhlrf.vbs

      Filesize

      492B

      MD5

      a08c77e615c26646a95452f22655a7af

      SHA1

      a9b22345b72c7ed979b05d96abf5205d640122b1

      SHA256

      bc3e711162ad21a5cc3e0ddfb993ccdba13a0a24419d4443402f42c7c24b5792

      SHA512

      d218b7cbfd91ae1ef8b3207b67772c5a06bd38057797958fe89db13e8f4170ed74469c6d25cc68997dd7c65755ea01f8bf949dac413d1b6820fab0192281e891

    • memory/540-70-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-69-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-80-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-84-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-79-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-83-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-61-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-55-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-63-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-64-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-82-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-65-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-81-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-68-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-87-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-59-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-91-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-78-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-77-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-76-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-74-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/540-60-0x00000000000C0000-0x0000000000142000-memory.dmp

      Filesize

      520KB

    • memory/1084-11-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-17-0x00000000702ED000-0x000000007030B000-memory.dmp

      Filesize

      120KB

    • memory/1084-1-0x00000000702ED000-0x000000007030B000-memory.dmp

      Filesize

      120KB

    • memory/1084-8-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-0-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-2-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-3-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-5-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/1084-6-0x0000000070200000-0x0000000070471000-memory.dmp

      Filesize

      2.4MB

    • memory/2384-18-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-16-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-7-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-13-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-14-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-12-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-15-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-19-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-45-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-41-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-40-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-39-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-38-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-37-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-36-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-24-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-21-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/2384-20-0x0000000000A30000-0x0000000000AB2000-memory.dmp

      Filesize

      520KB

    • memory/3564-50-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-58-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-51-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-52-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-53-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-54-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB

    • memory/3564-56-0x0000000000400000-0x000000000084D000-memory.dmp

      Filesize

      4.3MB