Resubmissions

19-11-2024 14:41

241119-r2m4wsxjdx 10

Analysis

  • max time kernel
    59s
  • max time network
    62s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-es
  • resource tags

    arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows
  • submitted
    19-11-2024 14:41

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    5.1MB

  • MD5

    b0b0ce5887fe4e050976eb7b6dcca652

  • SHA1

    f1b214aa8d48ed152dfe93e897b871751363f0c2

  • SHA256

    8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3

  • SHA512

    611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40

  • SSDEEP

    98304:6ZR9azHni3R3ousBqztSdq0doM+a76WmUydgul2bajywVmBTfnCAwvnZJ:6ZnaiG3Bq5UPRrul4imRnClv

Malware Config

Extracted

Family

remcos

Botnet

NOVIEMBRE 13 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    vlitanhs

  • mouse_option

    false

  • mutex

    necoclior-AOS1YP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2428
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:568
      • C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe
        "C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Users\Admin\AppData\Roaming\Authload_2\Mp3tag.exe
          C:\Users\Admin\AppData\Roaming\Authload_2\Mp3tag.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:896
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe
              C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe
              5⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4000
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57c2f3.rbs

      Filesize

      8KB

      MD5

      7cade0c4cc948d47fd1a9a5998ce8d79

      SHA1

      484d3744dc31a58ccd6c75fcf7e50da83635e6b9

      SHA256

      0329eed3196dca1ba35fd49d4ce1184c60b84b6f02293075dd19ec148d731f15

      SHA512

      f504a4c9065d006a3a0611513a971fa5ec728ea3f66ade6ee5192383fe9e4fa5d811534dece145f3dd0ddcb42c96ac5f2a207e7839c55b34dfc1a1419b71dcd7

    • C:\Users\Admin\AppData\Local\Temp\57f9ce64

      Filesize

      1.6MB

      MD5

      b6fd1bf32322092e274f7a2a056a5a70

      SHA1

      829127617cf32d03215ff5d4bd13f2c88ab8b71b

      SHA256

      31db84a2ac153deb6004e9f1f818949de98f13f7d0ba73693c97f156d7e6c357

      SHA512

      f034349e591cb84d299f6315546c563dd248f4069411666930195b644309bdbd8e5c0f5edd88769d1c0a5b4fe6bc0bfc41e36a83fcb0f7c8d45cd5ebd2e69426

    • C:\Users\Admin\AppData\Local\Temp\Kerb\Mp3tag.exe

      Filesize

      12.0MB

      MD5

      a7118dffeac3772076f1a39a364d608d

      SHA1

      6b984d9446f23579e154ec47437b9cf820fd6b67

      SHA256

      f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0

      SHA512

      f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890

    • C:\Users\Admin\AppData\Local\Temp\Kerb\ctmtfu

      Filesize

      1.1MB

      MD5

      b7626f9bde903c0bbb5cd1591433e1ce

      SHA1

      487adcc0ee7f4ee88ebb7d49a5281cb02636d350

      SHA256

      2d345940b1eedbc610f38c240f2295543536131c94a155d1f4262278fc25d2a4

      SHA512

      176711122486190252e263902a4786b3c8d368c8e3c9ad76ff7605654dbee0aa35d513779c39d51ea455cb5f65d4ce08602cff8d8dcab476a3d1d644851a0c7c

    • C:\Users\Admin\AppData\Local\Temp\Kerb\dprsbc

      Filesize

      16KB

      MD5

      8676b6f972be116e4031801380b253fd

      SHA1

      d2401aa086f7c1d6ba1771426584de52b8c34bbc

      SHA256

      e16559555888a2d450b17f7bb998c38295bd603138431a346ad3de7dbde88246

      SHA512

      dcf8bfe59cdcb11b25ec7e739e4ca2b1270bf8805ceed14f2fb506dd9fc01df8c766c025b3adde18b13c76f1a699fad21976df417b08c49c69593f229b0e27bc

    • C:\Users\Admin\AppData\Local\Temp\Kerb\tak_deco_lib.dll

      Filesize

      315KB

      MD5

      4dd5f2fb7782a1b8400db7c005c45c7b

      SHA1

      605e679e5a9c4b6324dfa992b60514dcbb5186b8

      SHA256

      dfd7da942d4e5ae820f788f56eeca312c916c5c3478e4cd898c1c19b3431991f

      SHA512

      78bedf7c602aa7618342e50e2659cc9615beb39b6782ffc4697848a08f0c1c696e4f1f7b4fecdcb51e07f9a6e93b448bca0b4cefe60817a141f68ae6c13840d1

    • C:\Users\Admin\AppData\Local\Temp\LmaSystemv5.exe

      Filesize

      433KB

      MD5

      fea067901f48a5f1faf7ca3b373f1a8f

      SHA1

      e8abe0deb87de9fe3bb3a611234584e9a9b17cce

      SHA256

      bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

      SHA512

      07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

    • C:\Windows\Installer\e57c2f2.msi

      Filesize

      5.1MB

      MD5

      b0b0ce5887fe4e050976eb7b6dcca652

      SHA1

      f1b214aa8d48ed152dfe93e897b871751363f0c2

      SHA256

      8e6981d8311dae27119abc5f7a20989372cae47881f7c746c880decef4dfc3b3

      SHA512

      611344cc69e0560684cf65f94f243a7402c769e8668a15c9a3eda12ca61839c765612bc10ba812e11163fd6de4fdb0b105210d8065d241f40b4a732268007c40

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.6MB

      MD5

      069cc512406e9c7dde083f9feae3090b

      SHA1

      3f3ec370e1d62cab14179c5a4e29878aa26b83f7

      SHA256

      76e11ea20384b1022e07007e12d17a90e127c757fe81fd8594991e47b09b2ea6

      SHA512

      866842d9c594b5aa258d350ece1e9eb8b2f1e5cfe6d6efc775495d62e12fc32429a3fb145b9d3883c2618478dfe8b72b22e4c6334b22c4d2a5890e551c500efe

    • \??\Volume{8555371d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{dadd881b-0919-47d8-9761-b550c9f04594}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      eff6f84c46326744f56ef8d7b3d66073

      SHA1

      f1d18e70fb3cdfdc5d5b95991a766c33ba5d00d3

      SHA256

      8b72004ca6a05ae50ef259152f1c09f7dbbd7c40ad29d8eeb52c039ab3a6f45e

      SHA512

      19968072cc06234a4823ca687f0797329dd47711ea9d6f217f5818cef5ab0811faf9439f027df8c38b82b42a4b02cbebc3ad9397b59d40352cfdc907c42c3ab2

    • memory/896-51-0x00007FFD7CC70000-0x00007FFD7CDEA000-memory.dmp

      Filesize

      1.5MB

    • memory/896-45-0x0000000000850000-0x00000000008AE000-memory.dmp

      Filesize

      376KB

    • memory/896-50-0x00007FFD7CC70000-0x00007FFD7CDEA000-memory.dmp

      Filesize

      1.5MB

    • memory/896-53-0x0000000000850000-0x00000000008AE000-memory.dmp

      Filesize

      376KB

    • memory/1652-56-0x00007FFD90220000-0x00007FFD90429000-memory.dmp

      Filesize

      2.0MB

    • memory/1652-57-0x0000000075450000-0x00000000755CD000-memory.dmp

      Filesize

      1.5MB

    • memory/1652-60-0x0000000075450000-0x00000000755CD000-memory.dmp

      Filesize

      1.5MB

    • memory/2160-41-0x0000000000530000-0x000000000058E000-memory.dmp

      Filesize

      376KB

    • memory/2160-33-0x00007FFD7CC70000-0x00007FFD7CDEA000-memory.dmp

      Filesize

      1.5MB

    • memory/2160-28-0x0000000000530000-0x000000000058E000-memory.dmp

      Filesize

      376KB

    • memory/4000-67-0x00007FFD90220000-0x00007FFD90429000-memory.dmp

      Filesize

      2.0MB

    • memory/4000-68-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB