Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 19:10

General

  • Target

    List of suspected clients/List of suspected clients.lnk

  • Size

    2KB

  • MD5

    58b6ff581948616b8f85dde8ca871e34

  • SHA1

    58a9ae3d9d810feb6895804331a9ffcc4d0396f6

  • SHA256

    7f621f8e117be1a9574709ac89d3abcdca2956b85ce2ee7b3169b0458366899d

  • SHA512

    13d92ae7f4f77d1b87bdb73fff7266c87128faef905f09d9559505d5f086943310e1262844239defeeeb33e97df00d39ff7c2a7574023cc2235321e6150535e6

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.9.2 Light

Botnet

RemoteHost

C2

66.154.102.133:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-W6WVSY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\List of suspected clients.lnk"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" start ptSrv.exe; start moorefiles.pdf
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe
        "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe
          "C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              6⤵
                PID:2164
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\moorefiles.pdf"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\9f83e32c

      Filesize

      1.1MB

      MD5

      9173207252e9f55e4b3f694426fc0436

      SHA1

      2bc97ac7eea547e687341785d4e155e71a1aa8bd

      SHA256

      bec38425519057867a238dcf4d35ed71bf1d5854f46a4241eae4fb40e2fdd7bc

      SHA512

      916289db6adb0bce45a31b07c55f1b539d29aa16d3c8b0cc0a62dc057e6fd93d9f29a9ab4cc355447e5629e6a3d71026e3841c8ef64d6267ef2c109d09afb643

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      50764ab66c85ba8d8f97a2420eef92d5

      SHA1

      1e5281376faf891806183e1fb2e3ce7461c3167a

      SHA256

      8b064f034983bf63846847fce0c00790d67ef6c3ce57beb3423c04b0f19db95e

      SHA512

      936f2cfc7c4082c5a1c76d390c5f4eddceabbe6b0791fa456193a5c04c1749158ec92405ad29bd3905054d3c46f77c836d2b1268c854ac655471ee67afe7ee74

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\VCRUNTIME140.dll

      Filesize

      81KB

      MD5

      16b26bc43943531d7d7e379632ed4e63

      SHA1

      565287de39649e59e653a3612478c2186096d70a

      SHA256

      346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

      SHA512

      b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\assignat.avi

      Filesize

      41KB

      MD5

      cd162f403f22216679f486ffa15fa534

      SHA1

      dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9

      SHA256

      9f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2

      SHA512

      b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ruffian.dbf

      Filesize

      875KB

      MD5

      a12fc5b2c56174be480fc3c720c7fcdd

      SHA1

      48cc8b9a3cd29bcc57a244dee5300d02e2487cf0

      SHA256

      c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2

      SHA512

      8abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1

    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\wbxtrace.dll

      Filesize

      103KB

      MD5

      530af153319a8254261d2de81b40cfe7

      SHA1

      63c7fb08e4dfe1e1cbd40a0fb333472822daa60a

      SHA256

      098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3

      SHA512

      6a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805

    • \Users\Admin\AppData\Roaming\EXN_notepad_v3\msvcp140.dll

      Filesize

      427KB

      MD5

      71a0aa2d05e9174cefd568347bd9c70f

      SHA1

      cb9247a0fa59e47f72df7d1752424b33a903bbb2

      SHA256

      fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

      SHA512

      6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

    • \Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe

      Filesize

      202KB

      MD5

      64179e64675e822559cac6652298bdfc

      SHA1

      cceed3b2441146762512918af7bf7f89fb055583

      SHA256

      c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9

      SHA512

      ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280

    • memory/856-87-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/856-69-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/856-71-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/856-70-0x0000000077800000-0x00000000779A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2164-151-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-152-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-158-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-157-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-156-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-155-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-154-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-153-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-144-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-150-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-143-0x0000000077800000-0x00000000779A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2164-148-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2164-146-0x0000000000700000-0x0000000000981000-memory.dmp

      Filesize

      2.5MB

    • memory/2164-149-0x0000000000400000-0x0000000000477000-memory.dmp

      Filesize

      476KB

    • memory/2428-47-0x0000000077800000-0x00000000779A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2428-46-0x00000000747F0000-0x0000000074964000-memory.dmp

      Filesize

      1.5MB

    • memory/2488-40-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-43-0x0000000002A60000-0x0000000002AE0000-memory.dmp

      Filesize

      512KB

    • memory/2488-38-0x000000001B660000-0x000000001B942000-memory.dmp

      Filesize

      2.9MB

    • memory/2488-39-0x00000000028D0000-0x00000000028D8000-memory.dmp

      Filesize

      32KB

    • memory/2488-45-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-44-0x0000000002A60000-0x0000000002AE0000-memory.dmp

      Filesize

      512KB

    • memory/2488-41-0x0000000002A60000-0x0000000002AE0000-memory.dmp

      Filesize

      512KB

    • memory/2488-42-0x000007FEF5D50000-0x000007FEF66ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2772-139-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/2772-92-0x0000000077800000-0x00000000779A9000-memory.dmp

      Filesize

      1.7MB

    • memory/2772-142-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/2772-89-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB

    • memory/2772-140-0x0000000074760000-0x00000000748D4000-memory.dmp

      Filesize

      1.5MB