Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2023, 14:18 UTC

General

  • Target

    Revised Purchase Order.exe

  • Size

    534KB

  • MD5

    7a904d47ee91783b4ff379093ddb333b

  • SHA1

    a2d467355cc2933b1986eba160420ac38997a5f6

  • SHA256

    3fa0a1d295887bbf530fdec6ba6ad140b8a185507a630fdb12bff7f0cdf355ae

  • SHA512

    e64483cf8a9e5940d9274ee1f580852f4b6c85d25395a81a5c8169d6a2326ece4f3f45bcd6a98c4c59658b8b6b8d9f495016c4b98049f35e9a27b75a85b3e5c5

  • SSDEEP

    12288:X3D1eItkatK3CYLfTVJiqubs5X1SVE8kJ4Km1BQ1jcLP:5BlYSYLBJiPbsSRkJ4KmfwQP

Malware Config

Extracted

Family

remcos

Botnet

ramsuup

C2

194.147.140.197:34574

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    ramsuup.exe

  • copy_folder

    ramsuup

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-HFU2GV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    ramsuup

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe
      "C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe
        "C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe
          "C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:4396

Network

  • flag-us
    DNS
    geoplugin.net
    ramsuup.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    ramsuup.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Tue, 14 Feb 2023 14:20:00 GMT
    server: Apache
    content-length: 930
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • flag-us
    DNS
    96.108.152.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    96.108.152.52.in-addr.arpa
    IN PTR
    Response
  • 194.147.140.197:34574
    tls
    ramsuup.exe
    3.2kB
    1.5kB
    13
    16
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    ramsuup.exe
    623 B
    1.3kB
    12
    3

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 20.189.173.15:443
    322 B
    7
  • 178.79.208.1:80
    322 B
    7
  • 178.79.208.1:80
    322 B
    7
  • 178.79.208.1:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 204.79.197.200:443
    www.bing.com
    tls, https
    3.1kB
    8.4kB
    19
    16
  • 8.8.8.8:53
    geoplugin.net
    dns
    ramsuup.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

  • 8.8.8.8:53
    96.108.152.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    96.108.152.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe

    Filesize

    534KB

    MD5

    7a904d47ee91783b4ff379093ddb333b

    SHA1

    a2d467355cc2933b1986eba160420ac38997a5f6

    SHA256

    3fa0a1d295887bbf530fdec6ba6ad140b8a185507a630fdb12bff7f0cdf355ae

    SHA512

    e64483cf8a9e5940d9274ee1f580852f4b6c85d25395a81a5c8169d6a2326ece4f3f45bcd6a98c4c59658b8b6b8d9f495016c4b98049f35e9a27b75a85b3e5c5

  • C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe

    Filesize

    534KB

    MD5

    7a904d47ee91783b4ff379093ddb333b

    SHA1

    a2d467355cc2933b1986eba160420ac38997a5f6

    SHA256

    3fa0a1d295887bbf530fdec6ba6ad140b8a185507a630fdb12bff7f0cdf355ae

    SHA512

    e64483cf8a9e5940d9274ee1f580852f4b6c85d25395a81a5c8169d6a2326ece4f3f45bcd6a98c4c59658b8b6b8d9f495016c4b98049f35e9a27b75a85b3e5c5

  • C:\Users\Admin\AppData\Roaming\ramsuup\ramsuup.exe

    Filesize

    534KB

    MD5

    7a904d47ee91783b4ff379093ddb333b

    SHA1

    a2d467355cc2933b1986eba160420ac38997a5f6

    SHA256

    3fa0a1d295887bbf530fdec6ba6ad140b8a185507a630fdb12bff7f0cdf355ae

    SHA512

    e64483cf8a9e5940d9274ee1f580852f4b6c85d25395a81a5c8169d6a2326ece4f3f45bcd6a98c4c59658b8b6b8d9f495016c4b98049f35e9a27b75a85b3e5c5

  • memory/3368-133-0x0000000005D70000-0x0000000006314000-memory.dmp

    Filesize

    5.6MB

  • memory/3368-134-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3368-132-0x0000000000E30000-0x0000000000EBC000-memory.dmp

    Filesize

    560KB

  • memory/4396-147-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4396-148-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4396-149-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4396-150-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5116-139-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5116-138-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5116-137-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5116-143-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/5116-136-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.