Analysis

  • max time kernel
    147s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 04:45

General

  • Target

    Bunker Notification_pdf.exe

  • Size

    1.5MB

  • MD5

    5ab91d5300577930a3ec8e2bd897ca33

  • SHA1

    a77d800b2c961a9e48e6ddf473a0e0edf09c7cbd

  • SHA256

    bbf5e00ee212abad8f3f658e642b896c73f6b6159b1a49a2adb86b7f2f0f46b9

  • SHA512

    fb5ff26ee8a4b831978790780f38735f8891de859a325615a9837e26ce60941171f55a45273a8c7b450c16ddfff646783db9b21bd3978af6cb9e56b7144866d5

  • SSDEEP

    24576:cAHnh+eWsN3skA4RV1Hom2KXFmIas9tlB8EmOhXMUNhL8HZxhvAN5s8zuzA5:7h+ZkldoPK1Xas/jRFL85xhOvH

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.18.214:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-AOD6MB

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 8 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe"
      2⤵
        PID:5040
      • C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\Bunker Notification_pdf.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\ivjsklzz"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1064
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\kxodlekbyqh"
            4⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:3872
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\vrtvlwuvmyzftqt"
            4⤵
              PID:768
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\Admin\AppData\Local\Temp\vrtvlwuvmyzftqt"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 612
            3⤵
            • Program crash
            PID:1784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1000 -ip 1000
        1⤵
          PID:1424

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\finitism

          Filesize

          140KB

          MD5

          5e453263ab15cff0faa49ace1dea3df9

          SHA1

          df823ffce8714ce1eebd6d359893b21389d5eb54

          SHA256

          476e490452c9a910d02729f2652c74a146ef0aee11476e93bc149fc4f962670f

          SHA512

          01e91236ac60b0498a83fc69c9f89ee9b456631b65f96ecea57218da2bac3ac517e2f88e90924cd407d8d454899e1e733a4fc16bd07ef52ffdda7b9e288c9d09

        • C:\Users\Admin\AppData\Local\Temp\forniciform

          Filesize

          483KB

          MD5

          5150091a091feaf4e3938dc93aa890a1

          SHA1

          53e52e04798918c66938c80673c82bc1920d9506

          SHA256

          9d37b9c878bd89b0fc6de8ddb607faa299ce2e5f53f40166422b79035801f1d2

          SHA512

          aa59d9e865f6ff4ec6fe1f118ac3d421f262c8c2baf6a8e223951e10d21acdcdfe2aadbae239f260a8d7e1c8f11b164ae9c7091b50e37d2e1e4b92384762aa00

        • C:\Users\Admin\AppData\Local\Temp\ivjsklzz

          Filesize

          4KB

          MD5

          ac300aeaf27709e2067788fdd4624843

          SHA1

          e98edd4615d35de96e30f1a0e13c05b42ee7eb7b

          SHA256

          d2637d58bb120dc6fefe2f38d6e0d4b308006b8639106a7f9e915fa80b5cc9d9

          SHA512

          09c46e708f9d253dccd4d943639d9f8126f868ae3dcd951aad12222bb98b5d3814676f878c8391b9bdab5dedcf5b9e9eaeb2ad3ffec57bda875198735586d4df

        • memory/628-11-0x0000000001220000-0x0000000001620000-memory.dmp

          Filesize

          4.0MB

        • memory/1000-25-0x0000000001080000-0x0000000001480000-memory.dmp

          Filesize

          4.0MB

        • memory/1036-50-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/1036-46-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/1036-47-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/1036-57-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/1036-42-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/1064-38-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1064-59-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1064-45-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1064-51-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1064-52-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1284-67-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-69-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-37-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-77-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-34-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-35-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-76-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-27-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-75-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-32-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-33-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-31-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-30-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-74-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-29-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-61-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1284-65-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1284-64-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1284-26-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-66-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-68-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-28-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-73-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-70-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-71-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1284-72-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3872-43-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/3872-39-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/3872-49-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/3872-53-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/3872-48-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB