Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 09:24

General

  • Target

    Browserchannel_test.exe

  • Size

    1.1MB

  • MD5

    18400a6db4000c6776de3a74f9569fc9

  • SHA1

    902d038140502d776db62673ee28a68f2ab0bf63

  • SHA256

    ce924608d3184bd96670d0b1c87b3b9dd1898cd00548f5c64eb09dbd36e708b4

  • SHA512

    172d17fb9d4913b54c41d07958623fb292f39721165138d03d7462325cb294686cf7b163304cb47a4098361b102a475a578fabb77c4cd73b3b4bf61c34dd96d7

  • SSDEEP

    24576:i1FvXWeilJJzhVN/XAfsCTv3wbodhY4T6XBDuOIAxsTbtC2:i1tXWeilJJdVN/AUifY4T6XDxCZl

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

retghrtgwtrgtg.bounceme.net:3839

listpoints.click:7020

datastream.myvnc.com:5225

gservicese.com:2718

center.onthewifi.com:8118

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    explorer.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-OPX7KW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe
        "C:\Users\Admin\AppData\Local\Temp\Browserchannel_test.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2164
      • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe
        C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
              PID:1792

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        893b2d886dd615a95ce60011f01792c7

        SHA1

        a91c89ebd5351893b1e5c684350ae380447c84cf

        SHA256

        7091081da703d581558cf2d6db5855ed3e9f2a63631b1e92fcdda0b8c2d046ac

        SHA512

        871174c964719710d23393a521e7fe0afcc81c31c9305e77e492f217f409cbe35f9326cb8d354bbb30bfee79a026f0fb613a7b2b38bb32959c03a4b0da1503f0

      • C:\Users\Admin\AppData\Local\Temp\259dce1c

        Filesize

        1.1MB

        MD5

        44efc671dbd9fe79ec23c21ac77ff91c

        SHA1

        4c89f8d9194b2a669063c03a4039fd181ba181a1

        SHA256

        eb12e9ac2a9699f0185e5345575aa3be7ded54146f0c8029647c4b366424257f

        SHA512

        45ada332a5d6b800873e0afec2b3f4764a801b1e1169d47cedf89a558df51491c670b929319b46c921ec19fe118bc0b0b1dfbbcf178bdd8d5a3d86596d27b602

      • C:\Users\Admin\AppData\Local\Temp\Cab4C6D.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\Tar4D0C.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • C:\Users\Admin\AppData\Roaming\updatebgv5\ASUS_WMI.dll

        Filesize

        224KB

        MD5

        3f109a02c8d642e8003a1188df40d861

        SHA1

        f723f38471b8872443aa9177eef12a96c02cc84a

        SHA256

        6523b44da6fa7078c7795b7705498e487b0625e28e15aec2d270c6e4a909b5a5

        SHA512

        023696a52d48c465ab62e3ee754b445093b8a0ed0a232b430ce1f0db3dae382c9e1fba210c2b04d1018cc29bfb69c546976912f3939a76e98bcb792ae57af0da

      • C:\Users\Admin\AppData\Roaming\updatebgv5\ATKEX.dll

        Filesize

        84KB

        MD5

        e68562f63265e1a70881446b4b9dc455

        SHA1

        da16ef9367bde3ce892b1a0e33bc179d8acdceb3

        SHA256

        c8b16f1c6883a23021da37d9116a757f971fe919d64ef8f9dba17a7d8dd39adb

        SHA512

        6bedea10a5b50f6e93e8566c18970c8ad1b8dfc7d5961069fc5d5216dcdded0b2a2ad8dd91f4ad80f8604d573a343c126df238ee5c448cdc26b899077957a674

      • C:\Users\Admin\AppData\Roaming\updatebgv5\AsIO.dll

        Filesize

        120KB

        MD5

        46e6a0c97132a518620763caff0da368

        SHA1

        e39db0fb68e2df5a2d068c9c29f1e0c464aa66f2

        SHA256

        08cb42002f6b659182088f9756483627d0b4ebb9ed32eca89239ee626d1c1ce4

        SHA512

        117b8a042cd0004ece1b64c0222956c5e6f54c409e394dbbf72b293374d1abcb222a789067626cce3dc198ad8a3a70e2b73fab7dec71c82341970377fca80066

      • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

        Filesize

        446KB

        MD5

        485008b43f0edceba0e0d3ca04bc1c1a

        SHA1

        55ae8f105af415bb763d1b87f6572f078052877c

        SHA256

        12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

        SHA512

        402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

      • C:\Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

        Filesize

        446KB

        MD5

        485008b43f0edceba0e0d3ca04bc1c1a

        SHA1

        55ae8f105af415bb763d1b87f6572f078052877c

        SHA256

        12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

        SHA512

        402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

      • C:\Users\Admin\AppData\Roaming\updatebgv5\resort.dbf

        Filesize

        923KB

        MD5

        0192bf28a80e86fdd32aeb6e7aeacb53

        SHA1

        5dcbe85578c66dffaa282301b073d4a6543b6c03

        SHA256

        a406ab43597e21e1281adf134da4a5309f718361f90541824e5f0b2e99a2f3bf

        SHA512

        24e6c972676c88f510432c54159143af3e489816336425645250138e98b6ca242cc3d43da87997d515ae640e5ef3c237600572b99a058df11efce1fec219ea0c

      • \Users\Admin\AppData\Roaming\updatebgv5\ASUS_WMI.dll

        Filesize

        224KB

        MD5

        3f109a02c8d642e8003a1188df40d861

        SHA1

        f723f38471b8872443aa9177eef12a96c02cc84a

        SHA256

        6523b44da6fa7078c7795b7705498e487b0625e28e15aec2d270c6e4a909b5a5

        SHA512

        023696a52d48c465ab62e3ee754b445093b8a0ed0a232b430ce1f0db3dae382c9e1fba210c2b04d1018cc29bfb69c546976912f3939a76e98bcb792ae57af0da

      • \Users\Admin\AppData\Roaming\updatebgv5\ATKEX.dll

        Filesize

        84KB

        MD5

        e68562f63265e1a70881446b4b9dc455

        SHA1

        da16ef9367bde3ce892b1a0e33bc179d8acdceb3

        SHA256

        c8b16f1c6883a23021da37d9116a757f971fe919d64ef8f9dba17a7d8dd39adb

        SHA512

        6bedea10a5b50f6e93e8566c18970c8ad1b8dfc7d5961069fc5d5216dcdded0b2a2ad8dd91f4ad80f8604d573a343c126df238ee5c448cdc26b899077957a674

      • \Users\Admin\AppData\Roaming\updatebgv5\AsIO.dll

        Filesize

        120KB

        MD5

        46e6a0c97132a518620763caff0da368

        SHA1

        e39db0fb68e2df5a2d068c9c29f1e0c464aa66f2

        SHA256

        08cb42002f6b659182088f9756483627d0b4ebb9ed32eca89239ee626d1c1ce4

        SHA512

        117b8a042cd0004ece1b64c0222956c5e6f54c409e394dbbf72b293374d1abcb222a789067626cce3dc198ad8a3a70e2b73fab7dec71c82341970377fca80066

      • \Users\Admin\AppData\Roaming\updatebgv5\atkexComSvc.exe

        Filesize

        446KB

        MD5

        485008b43f0edceba0e0d3ca04bc1c1a

        SHA1

        55ae8f105af415bb763d1b87f6572f078052877c

        SHA256

        12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

        SHA512

        402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

      • memory/1708-154-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1708-203-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1708-204-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1708-156-0x0000000077030000-0x00000000771D9000-memory.dmp

        Filesize

        1.7MB

      • memory/1708-206-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1792-208-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-211-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-220-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-214-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-213-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-212-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-215-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-219-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-218-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-217-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-207-0x0000000077030000-0x00000000771D9000-memory.dmp

        Filesize

        1.7MB

      • memory/1792-216-0x0000000000400000-0x0000000000483000-memory.dmp

        Filesize

        524KB

      • memory/1792-210-0x00000000004F0000-0x0000000000771000-memory.dmp

        Filesize

        2.5MB

      • memory/1944-152-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1944-148-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/1944-149-0x0000000077030000-0x00000000771D9000-memory.dmp

        Filesize

        1.7MB

      • memory/1944-150-0x0000000074660000-0x00000000747D4000-memory.dmp

        Filesize

        1.5MB

      • memory/2164-138-0x000007FEF66E0000-0x000007FEF6838000-memory.dmp

        Filesize

        1.3MB

      • memory/2164-88-0x000000013FB80000-0x000000013FCAB000-memory.dmp

        Filesize

        1.2MB

      • memory/2164-125-0x000007FEF66E0000-0x000007FEF6838000-memory.dmp

        Filesize

        1.3MB

      • memory/2164-127-0x000007FEF66E0000-0x000007FEF6838000-memory.dmp

        Filesize

        1.3MB

      • memory/2164-128-0x000007FEF66E0000-0x000007FEF6838000-memory.dmp

        Filesize

        1.3MB

      • memory/2164-151-0x000007FEF66E0000-0x000007FEF6838000-memory.dmp

        Filesize

        1.3MB