Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2024, 06:57 UTC

General

  • Target

    POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe

  • Size

    920KB

  • MD5

    837245dd0067f14b51b01c3ec2abd1e2

  • SHA1

    050af9b128d86975c8afa6d62b1bedec0d6f20b0

  • SHA256

    972d31f6bff6eed33197d77be4cf2027535bd64d42965c207c6e541257a4e112

  • SHA512

    b0372c59246b7263fa213cf341af74aab174205d8ba6f06cfa18b92c16a8aed16b889fb2c37ffe27e1aa79f41c2a6be02e756dee6bad86d8ade27797d80a91c7

  • SSDEEP

    24576:jMyQZrc+IbxyYMv5KXgoNV8LCZacnu4Z1aNR3:PQ9c+IFrnemod46d

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

172.245.123.14:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-3DXQCZ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
    "C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ppcjCFk.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2816
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ppcjCFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB78C.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2792
    • C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      "C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"
      2⤵
        PID:2812
      • C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
        "C:\Users\Admin\AppData\Local\Temp\POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2932

    Network

    • flag-us
      DNS
      geoplugin.net
      POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      Remote address:
      8.8.8.8:53
      Request
      geoplugin.net
      IN A
      Response
      geoplugin.net
      IN A
      178.237.33.50
    • flag-nl
      GET
      http://geoplugin.net/json.gp
      POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      Remote address:
      178.237.33.50:80
      Request
      GET /json.gp HTTP/1.1
      Host: geoplugin.net
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      date: Thu, 14 Nov 2024 06:57:39 GMT
      server: Apache
      content-length: 956
      content-type: application/json; charset=utf-8
      cache-control: public, max-age=300
      access-control-allow-origin: *
    • 172.245.123.14:2404
      tls
      POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      3.5kB
      1.6kB
      14
      17
    • 178.237.33.50:80
      http://geoplugin.net/json.gp
      http
      POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      577 B
      1.3kB
      11
      3

      HTTP Request

      GET http://geoplugin.net/json.gp

      HTTP Response

      200
    • 8.8.8.8:53
      geoplugin.net
      dns
      POSparepartsandlistoftheprodcutsURGENTSUPPLY.exe
      59 B
      75 B
      1
      1

      DNS Request

      geoplugin.net

      DNS Response

      178.237.33.50

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB78C.tmp

      Filesize

      1KB

      MD5

      a60e84ff344bdea796d96449f9757c17

      SHA1

      e55efe9487c8908f85eee4ca619e6ba9dacb35d4

      SHA256

      24920384ae77f5c31957b6cf3dfc57db0b12063c1959062268399a08d6dbd86e

      SHA512

      cbc68a5bfc1894d8a857628732e24fed361a9919e6d5a3c7ba18185a60d5e35d56abcfb7aade2a19401e68c5324ae0a467a384bac5308fe8e0b6d72042ac819b

    • memory/2900-0-0x0000000074B2E000-0x0000000074B2F000-memory.dmp

      Filesize

      4KB

    • memory/2900-1-0x0000000000E30000-0x0000000000F1C000-memory.dmp

      Filesize

      944KB

    • memory/2900-2-0x0000000074B20000-0x000000007520E000-memory.dmp

      Filesize

      6.9MB

    • memory/2900-3-0x00000000004B0000-0x00000000004C2000-memory.dmp

      Filesize

      72KB

    • memory/2900-4-0x0000000074B2E000-0x0000000074B2F000-memory.dmp

      Filesize

      4KB

    • memory/2900-5-0x0000000074B20000-0x000000007520E000-memory.dmp

      Filesize

      6.9MB

    • memory/2900-6-0x0000000005E60000-0x0000000005F24000-memory.dmp

      Filesize

      784KB

    • memory/2900-31-0x0000000074B20000-0x000000007520E000-memory.dmp

      Filesize

      6.9MB

    • memory/2932-28-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-33-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-20-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-27-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-22-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-30-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-29-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2932-24-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-16-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-14-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-18-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-32-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-34-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-37-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-39-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-40-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-41-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-42-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-44-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-43-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-45-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2932-46-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.