Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe

Overview

General Information

Sample name:172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe
Analysis ID:1472507
MD5:fb827555c8ef70538f5a02fd7d970fef
SHA1:2b208bd4d060a487afd936b4fe2d76213317f9c4
SHA256:c9197ccebccea890b5dd438e3bd1a735038d697ddb8d94bb262e6568a0e6ef40
Tags:base64-decodedexe
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.

Detection

Remcos
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara signature match

Classification

NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
SourceRuleDescriptionAuthorStrings
172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x71b16:$a1: Remcos restarted by watchdog!
      • 0x7208e:$a3: %02i:%02i:%02i:%03i
      172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
      • 0x6b8f4:$str_a1: C:\Windows\System32\cmd.exe
      • 0x6b870:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x6b870:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x6bd70:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x6c5a0:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x6b964:$str_b2: Executing file:
      • 0x6c9f3:$str_b3: GetDirectListeningPort
      • 0x6c390:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x6c510:$str_b7: \update.vbs
      • 0x6b98c:$str_b9: Downloaded file:
      • 0x6b978:$str_b10: Downloading file:
      • 0x6ba1c:$str_b12: Failed to upload file:
      • 0x6c9bb:$str_b13: StartForward
      • 0x6c9db:$str_b14: StopForward
      • 0x6c468:$str_b15: fso.DeleteFile "
      • 0x6c3fc:$str_b16: On Error Resume Next
      • 0x6c498:$str_b17: fso.DeleteFolder "
      • 0x6ba0c:$str_b18: Uploaded file:
      • 0x6b9cc:$str_b19: Unable to delete:
      • 0x6c430:$str_b20: while fso.FileExists("
      • 0x6bea9:$str_c0: [Firefox StoredLogins not found]
      172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x6b7e0:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x6b774:$s1: CoGetObject
      • 0x6b788:$s1: CoGetObject
      • 0x6b7a4:$s1: CoGetObject
      • 0x75a90:$s1: CoGetObject
      • 0x6b734:$s2: Elevation:Administrator!new:
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Yara matchFile source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLE
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2f1d640d-c

      Exploits

      barindex
      Source: Yara matchFile source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLE
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLE

      System Summary

      barindex
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
      Source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
      Source: classification engineClassification label: mal64.troj.expl.winEXE@0/0@0/0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
      System Information Discovery
      Remote Services1
      Archive Collected Data
      Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://geoplugin.net/json.gp/C0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://geoplugin.net/json.gp/C172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exefalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1472507
        Start date and time:2024-07-12 23:50:09 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 49s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:1
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe
        Detection:MAL
        Classification:mal64.troj.expl.winEXE@0/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Unable to launch sample, stop analysis
        • No process behavior to analyse as no analysis process or sample was found
        • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 93.184.221.240
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ocsp.edge.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net
        • VT rate limit hit for: 172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        fp2e7a.wpc.phicdn.nethttps://ik.imagekit.io/gxpn0jo1s/tgearwtyetgwaetgwa4t6w4a6yytyseztsetsetserte.html?updatedAt=3047319305?0595vfs0snhw3jn#4XoKCq127845cDyC289vehxtterqj1617VXBGKGZCTGTHTMC44244/256826q14Get hashmaliciousUnknownBrowse
        • 192.229.221.95
        http://sherwoodhomeshow.comGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        https://www.americanexpress.com/us/cmkyc/Get hashmaliciousUnknownBrowse
        • 192.229.221.95
        https://rise.articulate.com/share/P1iJp0yB_bTh32WFRRy74LcbPLqlelKL#/lessons/B8YD5iyNY6mhPG043RiexudIPbtOgtU2Get hashmaliciousHTMLPhisherBrowse
        • 192.229.221.95
        http://d705v.crent365.comGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        https://t.apemail.net/c/nqkqka2ukicqmbqgdicq6aaedibqcvibdihqmbaedjkaoa2uaecqkdqcaiavkfi3audqkaypa4dbwaabbydqcaqobynq4byoaedqeaipamnqogyvpf3bkgyvafkambqpkikwu-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmcqabibamdqggyfaycqiaibainqkbyfamhqobq3aubq4aypaadqggyvaubviuqfaydamgqfb4aaigqdafkqcgqpaycaigsua4bviaifauhaeaqbkukrwdqhbyaqoaqbb4brwfl3ijmvmrixpfjeaf3okjlekfy2c4dqefy7mzbf4vc4c5sfewktdykrwflfojqx44tacunqaaioa4aqedqodmkv6q2di5ca2gaykzbu4vsrdfnu4gcwircfeq2ecunugrkckinqaaqcdmkxs5qvdnmuew23dnmuew23dnmuew23dnmuew23dmkqcvagayhveflkGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        http://www.newsmaxinvest.comGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        http://venteon.comGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
        • 192.229.221.95
        http://www.ashlardev.comGet hashmaliciousUnknownBrowse
        • 192.229.221.95
        No context
        No context
        No context
        No created / dropped files found
        File type:MS-DOS executable
        Entropy (8bit):6.676027952027281
        TrID:
        • Generic Win/DOS Executable (2004/3) 49.94%
        • DOS Executable Generic (2002/1) 49.89%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
        File name:172082094700db9e9091b6a6dbee178a20f02e04b0e858330e4aa6383213e7388d36089f4b506.dat-decoded.exe
        File size:525'414 bytes
        MD5:fb827555c8ef70538f5a02fd7d970fef
        SHA1:2b208bd4d060a487afd936b4fe2d76213317f9c4
        SHA256:c9197ccebccea890b5dd438e3bd1a735038d697ddb8d94bb262e6568a0e6ef40
        SHA512:739e204433882dde575eb9fcd472a78a29f6ce720f9bef26df56ad295f964ff31141dda30fc2506e4e993676a9bc4b25ccbb2abb4da71a63cf646fe5ad99e332
        SSDEEP:6144:Z7BJulkWSG6QdqI2DBQ/l0/U6fsjLw84xToJs5iAuMcNDje104ZV7Xocy6Tdc:ZVJuKWd21Ea/U4sj084x8qVxZVLZc
        TLSH:61B48D11AA91C031E8F71E300E2AEE72FEBABC5015214C6B77DD0C7ABD715407A25EE6
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........-H..~H..~H...z.C.:..f$~[..~.f&C.:....~.f'~V...z.C.:.A.Q~I..~.Z.C.:.J..~....R...z.C.:.....r..~....j..~A.F~Q...z.C.:.H..~u..~.
        Icon Hash:00928e8e8686b000
        TimestampSource PortDest PortSource IPDest IP
        Jul 12, 2024 23:51:20.121433973 CEST53650801.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 12, 2024 23:51:15.818140984 CEST1.1.1.1192.168.2.50x88caNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
        Jul 12, 2024 23:51:15.818140984 CEST1.1.1.1192.168.2.50x88caNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
        No statistics
        No system behavior
        No disassembly