{"id":1159,"date":"2018-07-07T21:28:06","date_gmt":"2018-07-07T20:28:06","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1159"},"modified":"2018-07-07T21:29:58","modified_gmt":"2018-07-07T20:29:58","slug":"2018-07-07-remcos-malspam","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1159","title":{"rendered":"2018-07-07 Remcos Malspam"},"content":{"rendered":"<p>A quick write-up on this Remcos malspam. Some other previous entries that I have done aboutr Remcos can be found below:<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/?p=1106\" rel=\"noopener\" target=\"_blank\">http:\/\/www.herbiez.com\/?p=1106<\/a><br \/>\n<a href=\"http:\/\/www.herbiez.com\/?p=1073\" rel=\"noopener\" target=\"_blank\">http:\/\/www.herbiez.com\/?p=1073<\/a><\/p>\n<p>All the emails seem to come from the sender info@yusheng-wiremesh.com with the subject of &#8220;Returned Funds fort Invoice DFER4567 July Despatch.&#8221; The malspam also comes with an ACE attachment, that when extracted out, gives us the following binary: &#8220;Returned Funds fort Invoice DFER4567 July Despatch.exe.&#8221; A quick glance at some of the emails shows that they are all being sent from this IP address: 185.163.111.81 which shows a rDNS entry of &#8220;sv2.sendomail.eu&#8221; out of Romania.<\/p>\n<p>One thing to note here is that this sample did not reach back out when I ran this in Any.Run. Yet when looking at my VM, I got consistent callbacks to the C2 server.<\/p>\n<p>For the artifacts from this investigation, please see the repo <a href=\"http:\/\/github.com\/bloomer1016\/2018-07-07-Remcos-Malspam\" rel=\"noopener\" target=\"_blank\">here<\/a>.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/email.png\" alt=\"\" width=\"551\" height=\"503\" class=\"aligncenter size-full wp-image-1166\" \/><\/a><\/p>\n<p>IOCs:<br \/>\n=====<br \/>\n77.48.28.227:2442 (TCP)<\/p>\n<p>Artifacts:<br \/>\n==========<br \/>\nFile name: Returned Funds fort Invoice DFER4567 July Despatch.ace<br \/>\nFile size: 272KB<br \/>\nFile path: NA<br \/>\nMD5 hash: 00b683bb28daca30ce497a150622b1e3<br \/>\nVirustotal: <a href=\"http:\/\/www.virustotal.com\/#\/file\/b0a643049639f302e83d7bf10821d1fee0e9cf9e9cba036ba349fe54fc71b011\/detection\" rel=\"noopener\" target=\"_blank\">http:\/\/www.virustotal.com\/#\/file\/b0a643049639f302e83d7bf10821d1fee0e9cf9e9cba036ba349fe54fc71b011\/detection<\/a><br \/>\nDetection ratio: 8 \/ 60<br \/>\nFirst Detected: 2018-07-07 07:08:09<\/p>\n<p>File name: Returned Funds fort Invoice DFER4567 July Despatch.exe \/ notepad.exe<br \/>\nFile size: 615KB<br \/>\nFile path: NA<br \/>\nMD5 hash: 79457a7242ec2d7942ace7c4f1229cfc<br \/>\nFile path (notepad.exe): C:\\Users\\%username%AppData\\Roaming\\windows<br \/>\nAny.Run:  <a href=\"http:\/\/app.any.run\/tasks\/f9b778a3-7f2a-4e7d-9f4d-3533dcb71e7c\" rel=\"noopener\" target=\"_blank\">http:\/\/app.any.run\/tasks\/f9b778a3-7f2a-4e7d-9f4d-3533dcb71e7c<\/a><\/p>\n<p>File name: windows.vbs<br \/>\nFile size: 121B<br \/>\nFile path: C:\\Users\\Bill\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\<br \/>\nMD5 hash: e0a8777bd0b5123f8f42626d80326a45<\/p>\n<p>Analysis:<br \/>\n=========<br \/>\nFrom the host perspective, the user is tricked into opening this file by posing to need the user to check the &#8220;atthed [sic] bank report aand payment invoices&#8221; to kick off the infection chain. Once that happens, the process kicks off (Returned Funds fort Invoice DFER4567 July Despatch.exe &#8211; PID 2896), which proceeds to copy itself with a rename operation (renamed to notepad.exe) to the path of C:\\Users\\%username%AppData\\Roaming\\windows (PID 1660). <\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/rename-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/rename-1.png\" alt=\"\" width=\"493\" height=\"277\" class=\"aligncenter size-full wp-image-1164\" \/><\/a><\/p>\n<p>From here, notepad.exe (PID 1660) creates two other instances of itself with one of them spawning a cmd.exe (PID 2196) and reg.exe (PID 2672) processes to add the following registry key: &#8220;C:\\Windows\\System32\\reg.exe  ADD HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System \/v EnableLUA \/t REG_DWORD \/d 0 \/f.&#8221; The other notepad.exe process (PID 1660) creates the Windows startup VBS file in &#8220;C:\\Users\\Bill\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\&#8221;, a key log file, and also what takes screen caps of the desktop as well. The location of those files are &#8220;C:\\Users\\Bill\\AppData\\Roaming\\windows&#8221; (this is for the screen shots) and &#8220;C:\\Users\\Bill\\AppData\\Roaming\\remcos&#8221; (this is for the key logging file).<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/logging.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/logging.png\" alt=\"\" width=\"1630\" height=\"942\" class=\"aligncenter size-full wp-image-1162\" \/><\/a><\/p>\n<p>As far as persistance is concerned, that is obtained via the &#8220;windows.vbs&#8221; file created above which points to the malicious &#8220;notepad.exe&#8221; file.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/vbs.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/vbs.png\" alt=\"\" width=\"689\" height=\"79\" class=\"aligncenter size-full wp-image-1165\" \/><\/a><\/p>\n<p>I also came across the the following registry key, but I am not sure what exactly this is for. Possibly the hex encoded path to the malicious &#8220;notepad.exe&#8221; file.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/reg.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/reg.png\" alt=\"\" width=\"1889\" height=\"592\" class=\"aligncenter size-full wp-image-1163\" \/><\/a><\/p>\n<p>From a network perspective, there is not much to this infection. Once the binary is run, it connects to the IP address of 77.48.28.227 on port 2442 (TCP). The communication looks to be encoded\/encrypted so nothing can be made from looking at the different streams. Considering that there was only this callback being made, I can safely assume that the infected system was sending the updated key stroke logs and the screen caps to the c2.<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/c2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2018\/07\/c2.png\" alt=\"\" width=\"1759\" height=\"748\" class=\"aligncenter size-full wp-image-1160\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A quick write-up on this Remcos malspam. Some other previous entries that I have done aboutr Remcos can be found below: http:\/\/www.herbiez.com\/?p=1106 http:\/\/www.herbiez.com\/?p=1073 All the emails seem to come from the sender info@yusheng-wiremesh.com with the subject of &#8220;Returned Funds fort Invoice DFER4567 July Despatch.&#8221; The malspam also comes with an ACE attachment, that when extracted out, gives us the following binary: &#8220;Returned Funds fort Invoice DFER4567 July Despatch.exe.&#8221; A quick glance at some of the emails shows that they are all being sent from this IP address: 185.163.111.81 which shows a rDNS entry of &#8220;sv2.sendomail.eu&#8221; out of Romania. One thing&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1159\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[24],"class_list":["post-1159","post","type-post","status-publish","format-standard","hentry","category-packet-analysis","tag-remcos"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1159"}],"version-history":[{"count":3,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1159\/revisions"}],"predecessor-version":[{"id":1169,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1159\/revisions\/1169"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}