Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2024, 08:36

General

  • Target

    militaryrespondpro/militaryrespondpro.exe

  • Size

    7.5MB

  • MD5

    74538bcd359192ab8a3f3f1bf4e84adb

  • SHA1

    a20254ff13d8c9eda8569c8b9ce94328c4f8b924

  • SHA256

    0bb66047b9a8fc0ad9312c27166c507b82be23e28441be00b0e09b010068bdb6

  • SHA512

    47ef3fd2ddb6f0befdbfe2525b6062c8c4408cb0602cd0e1085b441fd9a94ec6a8884595bba9f2faa63a15e2db232d11f192aab2777ea0a7b72034abc589134d

  • SSDEEP

    196608:lSPQZgEkukO0V2ODNDwcv4RMcpBrcA0M5XgkOClcfWJTl:lSqDo12XMcBrclnkOCln

Malware Config

Extracted

Family

remcos

Botnet

build

C2

193.29.13.204:5850

Attributes
  • audio_folder

    ??????????? ??????

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    sys.dat

  • keylog_flag

    false

  • keylog_folder

    syslogs

  • keylog_path

    %WinDir%

  • mouse_option

    false

  • mutex

    34534534534ffffsdfd-IPKJ16

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    ?????????

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\militaryrespondpro\militaryrespondpro.exe
        "C:\Users\Admin\AppData\Local\Temp\militaryrespondpro\militaryrespondpro.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\militaryrespond.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\militaryrespond.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1848
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\militaryrespond.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\militaryrespond.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\militaryrespond.exe

      Filesize

      7.6MB

      MD5

      e53cdd984882793c93d3e9a9822b4a10

      SHA1

      2767df7cea3b973476902cc74ccee829e5a4cbd9

      SHA256

      37e7b15bd9b8ace5fd0e0a61b942748c772c8892d4ea1a4b4769ee72a9021636

      SHA512

      84ebc1ac7ebb77c74c0d6d473482f1150128d817541ff771c466e0857894fb6839ed4b94bd7b4cdf11772e11556fa8311080ddbac84b0d588f5ef91b708c679d

    • C:\Windows\syslogs\sys.dat

      Filesize

      144B

      MD5

      1bd319f26e96fe12277c2a529c71c170

      SHA1

      2254932ac485837a26840c780b88af7a03851be4

      SHA256

      a720f97c902c2f569530725f529e4772ede8cbabfab6a7630f6f30f82be7796b

      SHA512

      57cc0a6dd5249d46afc53d494c69ba56f04a4641a70767ef0c853d93fcd645ae6bf36863171833f334988c3d1852e7295bb5c3170f75c3bc88c4ecb386a221bd

    • memory/1848-5-0x000000007454E000-0x000000007454F000-memory.dmp

      Filesize

      4KB

    • memory/1848-6-0x0000000000BF0000-0x000000000138A000-memory.dmp

      Filesize

      7.6MB

    • memory/1848-7-0x0000000005D40000-0x0000000005DD2000-memory.dmp

      Filesize

      584KB

    • memory/1848-8-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/1848-9-0x0000000006320000-0x0000000006446000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-10-0x0000000006AF0000-0x0000000007094000-memory.dmp

      Filesize

      5.6MB

    • memory/1848-42-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-32-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-74-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-70-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-62-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-48-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-46-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-44-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-40-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-38-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-36-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-34-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-30-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-28-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-27-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-24-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-22-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-20-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-18-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-16-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-14-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-12-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-11-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-72-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-68-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-66-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-64-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-60-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-58-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-57-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-54-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-52-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-50-0x0000000006320000-0x0000000006440000-memory.dmp

      Filesize

      1.1MB

    • memory/1848-1085-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/1848-1086-0x0000000006650000-0x00000000066E8000-memory.dmp

      Filesize

      608KB

    • memory/1848-1087-0x00000000066F0000-0x000000000673C000-memory.dmp

      Filesize

      304KB

    • memory/1848-1091-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/1848-1092-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/1848-1093-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/1848-1094-0x000000007454E000-0x000000007454F000-memory.dmp

      Filesize

      4KB

    • memory/1848-1095-0x00000000068F0000-0x0000000006944000-memory.dmp

      Filesize

      336KB

    • memory/1848-1103-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3892-1102-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3892-1116-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB