Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe
Resource
win10v2004-20221111-en
General
-
Target
ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe
-
Size
1023KB
-
MD5
55ee911615a55fc7ed410f68324bb3e5
-
SHA1
71c9737ff98d14c30332f0197e03956c620de578
-
SHA256
ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31
-
SHA512
64ced508adb64328b5776179089456dae44372212ea4bcf46be01b5b6b1b6621ba6cc6feac9e0d1c36b76411645784ed7539b499d59d679c61a4f1a503575ff1
-
SSDEEP
24576:qohABYTjfr2z3GoVJZmyELytqveCspFtxNR/:3VXz+3DVOdve5prH
Malware Config
Extracted
remcos
RemoteHost
45.139.105.174:2210
212.193.30.230:6320
212.193.30.230:2286
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-UP55W2
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation remcos.exe -
Executes dropped EXE 3 IoCs
pid Process 4128 remcos.exe 4948 remcos.exe 2612 remcos.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3804 set thread context of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 4128 set thread context of 2612 4128 remcos.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe 1088 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 648 powershell.exe 648 powershell.exe 4128 remcos.exe 4208 powershell.exe 4128 remcos.exe 4128 remcos.exe 4128 remcos.exe 4208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe Token: SeDebugPrivilege 648 powershell.exe Token: SeDebugPrivilege 4128 remcos.exe Token: SeDebugPrivilege 4208 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 remcos.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3804 wrote to memory of 648 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 85 PID 3804 wrote to memory of 648 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 85 PID 3804 wrote to memory of 648 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 85 PID 3804 wrote to memory of 2604 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 87 PID 3804 wrote to memory of 2604 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 87 PID 3804 wrote to memory of 2604 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 87 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 3804 wrote to memory of 4284 3804 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 89 PID 4284 wrote to memory of 3872 4284 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 90 PID 4284 wrote to memory of 3872 4284 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 90 PID 4284 wrote to memory of 3872 4284 ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe 90 PID 3872 wrote to memory of 972 3872 WScript.exe 91 PID 3872 wrote to memory of 972 3872 WScript.exe 91 PID 3872 wrote to memory of 972 3872 WScript.exe 91 PID 972 wrote to memory of 4128 972 cmd.exe 93 PID 972 wrote to memory of 4128 972 cmd.exe 93 PID 972 wrote to memory of 4128 972 cmd.exe 93 PID 4128 wrote to memory of 4208 4128 remcos.exe 100 PID 4128 wrote to memory of 4208 4128 remcos.exe 100 PID 4128 wrote to memory of 4208 4128 remcos.exe 100 PID 4128 wrote to memory of 1088 4128 remcos.exe 102 PID 4128 wrote to memory of 1088 4128 remcos.exe 102 PID 4128 wrote to memory of 1088 4128 remcos.exe 102 PID 4128 wrote to memory of 4948 4128 remcos.exe 104 PID 4128 wrote to memory of 4948 4128 remcos.exe 104 PID 4128 wrote to memory of 4948 4128 remcos.exe 104 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105 PID 4128 wrote to memory of 2612 4128 remcos.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe"C:\Users\Admin\AppData\Local\Temp\ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vOEQrgpIUyHVF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vOEQrgpIUyHVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp19F0.tmp"2⤵
- Creates scheduled task(s)
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe"C:\Users\Admin\AppData\Local\Temp\ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\alcuzotfhswws.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vOEQrgpIUyHVF.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vOEQrgpIUyHVF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB96D.tmp"6⤵
- Creates scheduled task(s)
PID:1088
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"6⤵
- Executes dropped EXE
PID:4948
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD555ee911615a55fc7ed410f68324bb3e5
SHA171c9737ff98d14c30332f0197e03956c620de578
SHA256ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31
SHA51264ced508adb64328b5776179089456dae44372212ea4bcf46be01b5b6b1b6621ba6cc6feac9e0d1c36b76411645784ed7539b499d59d679c61a4f1a503575ff1
-
Filesize
1023KB
MD555ee911615a55fc7ed410f68324bb3e5
SHA171c9737ff98d14c30332f0197e03956c620de578
SHA256ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31
SHA51264ced508adb64328b5776179089456dae44372212ea4bcf46be01b5b6b1b6621ba6cc6feac9e0d1c36b76411645784ed7539b499d59d679c61a4f1a503575ff1
-
Filesize
1023KB
MD555ee911615a55fc7ed410f68324bb3e5
SHA171c9737ff98d14c30332f0197e03956c620de578
SHA256ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31
SHA51264ced508adb64328b5776179089456dae44372212ea4bcf46be01b5b6b1b6621ba6cc6feac9e0d1c36b76411645784ed7539b499d59d679c61a4f1a503575ff1
-
Filesize
1023KB
MD555ee911615a55fc7ed410f68324bb3e5
SHA171c9737ff98d14c30332f0197e03956c620de578
SHA256ff9b3972b169896c9f9cbb757a31dee0a842a5fae8d58aa2c476a3fd1aafea31
SHA51264ced508adb64328b5776179089456dae44372212ea4bcf46be01b5b6b1b6621ba6cc6feac9e0d1c36b76411645784ed7539b499d59d679c61a4f1a503575ff1
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5f8cc185f7c324c5e7ff6b2a9243144ea
SHA12f5fed541e06f80f17485d11e43883a8c07332e7
SHA256dcb71a9791d7c2613fa20174fda293bee135eb8e26a1b23e83f8d5e9bc8781f4
SHA5121b00e5cf6c6592bd181107eeadd1f9b9b23fb8f8b513018e03fc9e3c4cce78a1b055bd40d0459862e371213f5cf22f6875891254dc91fee51c95878c6bf3e226
-
Filesize
386B
MD51ec6289c6fd4c2ded6b2836ed28cbeb5
SHA1c4e08195e6c640eb8860acc03fda1d649b4fe070
SHA2566efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2
SHA51220bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288
-
Filesize
1KB
MD5b6ac12ca24a3501b52ac4236c2f60c3e
SHA19ab681aec276f847b01bcdbfe55737596d815b78
SHA256233def5a5258a4c6a83a99d310c49cc1905da17ba4dc02fb4ce4a1467f48c79e
SHA512a98c8c4b49401604bbec841bc3f331cce685b9be7829d08536d82965c66ebfaaa532ff8c6cdc1b8bfc880bf2f56992f098644f8855cc063376fe4fc1e4aab5bc
-
Filesize
1KB
MD5b6ac12ca24a3501b52ac4236c2f60c3e
SHA19ab681aec276f847b01bcdbfe55737596d815b78
SHA256233def5a5258a4c6a83a99d310c49cc1905da17ba4dc02fb4ce4a1467f48c79e
SHA512a98c8c4b49401604bbec841bc3f331cce685b9be7829d08536d82965c66ebfaaa532ff8c6cdc1b8bfc880bf2f56992f098644f8855cc063376fe4fc1e4aab5bc