Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 05:43

General

  • Target

    GUHUDES23ED.exe

  • Size

    1.4MB

  • MD5

    2279756982754f30b1c3a047acb5fb3c

  • SHA1

    da6889d365c47ac46a16f1b3409d04c5778e4d50

  • SHA256

    9a00523dfd6d321adb4fffbb54a1550055dde6301dddba3a5157a4169b11d462

  • SHA512

    9d741a15ba84d386e641854a2ddeb934424c64d2543e2ec34cf5f9d042932e2a075daf109c540310e0c887e0e32825ae8d9967bb32bd7b23c869123f08bf18d8

  • SSDEEP

    24576:VwOx9JKFIb6bQFf4SVuoOlwFjF0VbJszH2bF:zk90FQTlfJsz2

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

HOSYT

C2

194.147.140.246:1998

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-QOYAK6

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe
    "C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gmhPbe.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2612
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gmhPbe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp690F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2636
    • C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe
      "C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"
      2⤵
        PID:2524
      • C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe
        "C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\remcos\logs.dat

      Filesize

      144B

      MD5

      44563327749dd9ae0a42d87f75f4ce4c

      SHA1

      324ae12c38df11c1fcfe8462569ac50d8778679d

      SHA256

      1208fa7842ae77fd0a325de63ed13b6291700c62a3677e0b06cef28e2c766f35

      SHA512

      52c39e243534084223a15e91716d76e1e6ddbbbf18fd4396a8aba2673fe2061f00d1aad68258dfcabdc6b2df841152ee204b89ce4eacf9c9a8ce2fa59177844f

    • C:\Users\Admin\AppData\Local\Temp\tmp690F.tmp

      Filesize

      1KB

      MD5

      b4be3b9d62ce8d03b8146737db53ad33

      SHA1

      7c709a4aa0909b1b6a92d1d0d2eceeae786331fd

      SHA256

      030b3396aa6001e73bf5416aefd7678d2be3b66c7581bf26e10f59ada49f4a6b

      SHA512

      65b7328307907b81aa66ec1a8f7645c8c7020c84893a06a7d125be48f58de351ef94f6b658084347e7459ed55955a49b84053959a811ee692c473018f29417a4

    • memory/2204-0-0x00000000747F0000-0x0000000074EDE000-memory.dmp

      Filesize

      6.9MB

    • memory/2204-1-0x0000000000060000-0x00000000001CC000-memory.dmp

      Filesize

      1.4MB

    • memory/2204-2-0x0000000004A30000-0x0000000004A70000-memory.dmp

      Filesize

      256KB

    • memory/2204-3-0x0000000000660000-0x000000000067C000-memory.dmp

      Filesize

      112KB

    • memory/2204-4-0x00000000747F0000-0x0000000074EDE000-memory.dmp

      Filesize

      6.9MB

    • memory/2204-5-0x0000000004A30000-0x0000000004A70000-memory.dmp

      Filesize

      256KB

    • memory/2204-6-0x0000000000530000-0x0000000000540000-memory.dmp

      Filesize

      64KB

    • memory/2204-7-0x0000000005F50000-0x0000000006008000-memory.dmp

      Filesize

      736KB

    • memory/2204-34-0x00000000747F0000-0x0000000074EDE000-memory.dmp

      Filesize

      6.9MB

    • memory/2352-32-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-37-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-17-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-23-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-21-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-25-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2352-29-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-31-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-15-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-14-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-36-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-35-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-13-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-67-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-16-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-66-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-59-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-43-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-42-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-44-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-46-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-58-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-50-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2352-51-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/2612-39-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB

    • memory/2612-48-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB

    • memory/2612-40-0x0000000002650000-0x0000000002690000-memory.dmp

      Filesize

      256KB

    • memory/2612-41-0x0000000002650000-0x0000000002690000-memory.dmp

      Filesize

      256KB

    • memory/2612-38-0x000000006EC60000-0x000000006F20B000-memory.dmp

      Filesize

      5.7MB