Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 14:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe
Resource
win7-20230712-en
General
-
Target
75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe
-
Size
909KB
-
MD5
4853aa5ad98757a756f1acfe1bed460d
-
SHA1
816027f9fbce3d22624db698ede23a2d4cc25023
-
SHA256
75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e
-
SHA512
756dc810b13bf18bad2495b78afbfd0fee281de55eadc5a24b2ebd4ece60bffba01420f3edcc42994500d5978a277e832fb8627c058a2a7cac52bfcb25065097
-
SSDEEP
24576:F+1IOE/QNWkphcu3WGMPBGqHsOGCP9xMS5RkP5:F+1XrhcuW3GqBGCP9x/5RK5
Malware Config
Extracted
remcos
Thcinc
b6079658.sytes.net:6110
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
thcinc.exe
-
copy_folder
Thcinc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
thcinc
-
mouse_option
false
-
mutex
Rmc-X26LV5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1040 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30 PID 1556 wrote to memory of 1040 1556 75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe"C:\Users\Admin\AppData\Local\Temp\75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe"C:\Users\Admin\AppData\Local\Temp\75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1040
-
Network
-
Remote address:8.8.8.8:53Requestb6079658.sytes.netIN AResponseb6079658.sytes.netIN A109.206.243.174
-
Remote address:8.8.8.8:53Requestgeoplugin.netIN AResponsegeoplugin.netIN A178.237.33.50
-
GEThttp://geoplugin.net/json.gp75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exeRemote address:178.237.33.50:80RequestGET /json.gp HTTP/1.1
Host: geoplugin.net
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
server: Apache
content-length: 930
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
access-control-allow-origin: *
-
109.206.243.174:6110b6079658.sytes.nettls75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe3.3kB 1.4kB 12 14
-
178.237.33.50:80http://geoplugin.net/json.gphttp75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe301 B 2.4kB 5 4
HTTP Request
GET http://geoplugin.net/json.gpHTTP Response
200
-
8.8.8.8:53b6079658.sytes.netdns75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe64 B 80 B 1 1
DNS Request
b6079658.sytes.net
DNS Response
109.206.243.174
-
8.8.8.8:53geoplugin.netdns75e57d3f76491b9bc7fe155b20ea8f9498892bd54a34824fca50bf0ae4a1902e_JC.exe59 B 75 B 1 1
DNS Request
geoplugin.net
DNS Response
178.237.33.50
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5f92252039edc2b413f4b9e9ee147be74
SHA19ba83c4aa2f02de5c00d286f7dac0db03eaa689b
SHA256a4f5d2d858f0688c1ab613dc4eb1dfdf260505496d8f37d3eccfeb8e15df8725
SHA5121603d910b2562add14451c9385841d53b4bd61c7b48acf55c0eef6b9c1f6a73c441c94dd07a2c40c173115957a8fb95d4b35f8c7cb83096bd88456e3ae4c161f