Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1List of su...ts.lnk
windows7-x64
10List of su...ts.lnk
windows10-2004-x64
10List of su...ll.dll
windows7-x64
1List of su...ll.dll
windows10-2004-x64
1List of su...es.pdf
windows7-x64
1List of su...es.pdf
windows10-2004-x64
1List of su...40.dll
windows7-x64
3List of su...40.dll
windows10-2004-x64
3List of su...gr.dll
windows7-x64
1List of su...gr.dll
windows10-2004-x64
3List of su...rv.exe
windows7-x64
10List of su...rv.exe
windows10-2004-x64
10List of su...dt.dll
windows7-x64
1List of su...dt.dll
windows10-2004-x64
1List of su...40.dll
windows7-x64
List of su...40.dll
windows10-2004-x64
3List of su...ce.dll
windows7-x64
1List of su...ce.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
List of suspected clients/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
List of suspected clients/WCLDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
List of suspected clients/moorefiles.pdf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
List of suspected clients/moorefiles.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
List of suspected clients/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
List of suspected clients/msvcp140.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
List of suspected clients/ptMgr.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
List of suspected clients/ptMgr.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
List of suspected clients/ptSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
List of suspected clients/ptSrv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
List of suspected clients/ptusredt.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
List of suspected clients/ptusredt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
List of suspected clients/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
List of suspected clients/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
List of suspected clients/wbxtrace.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
List of suspected clients/wbxtrace.dll
Resource
win10v2004-20240226-en
General
-
Target
List of suspected clients/List of suspected clients.lnk
-
Size
2KB
-
MD5
58b6ff581948616b8f85dde8ca871e34
-
SHA1
58a9ae3d9d810feb6895804331a9ffcc4d0396f6
-
SHA256
7f621f8e117be1a9574709ac89d3abcdca2956b85ce2ee7b3169b0458366899d
-
SHA512
13d92ae7f4f77d1b87bdb73fff7266c87128faef905f09d9559505d5f086943310e1262844239defeeeb33e97df00d39ff7c2a7574023cc2235321e6150535e6
Malware Config
Extracted
remcos
4.9.2 Light
RemoteHost
66.154.102.133:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-W6WVSY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 ptSrv.exe -
Loads dropped DLL 5 IoCs
pid Process 2428 ptSrv.exe 856 ptSrv.exe 856 ptSrv.exe 856 ptSrv.exe 2772 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 856 set thread context of 2772 856 ptSrv.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 powershell.exe 2488 powershell.exe 2488 powershell.exe 2488 powershell.exe 2488 powershell.exe 2428 ptSrv.exe 856 ptSrv.exe 856 ptSrv.exe 2772 cmd.exe 2772 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 AcroRd32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 856 ptSrv.exe 2772 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2376 AcroRd32.exe 2376 AcroRd32.exe 2376 AcroRd32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2488 2088 cmd.exe 29 PID 2088 wrote to memory of 2488 2088 cmd.exe 29 PID 2088 wrote to memory of 2488 2088 cmd.exe 29 PID 2488 wrote to memory of 2428 2488 powershell.exe 30 PID 2488 wrote to memory of 2428 2488 powershell.exe 30 PID 2488 wrote to memory of 2428 2488 powershell.exe 30 PID 2488 wrote to memory of 2428 2488 powershell.exe 30 PID 2488 wrote to memory of 2376 2488 powershell.exe 31 PID 2488 wrote to memory of 2376 2488 powershell.exe 31 PID 2488 wrote to memory of 2376 2488 powershell.exe 31 PID 2488 wrote to memory of 2376 2488 powershell.exe 31 PID 2428 wrote to memory of 856 2428 ptSrv.exe 32 PID 2428 wrote to memory of 856 2428 ptSrv.exe 32 PID 2428 wrote to memory of 856 2428 ptSrv.exe 32 PID 2428 wrote to memory of 856 2428 ptSrv.exe 32 PID 856 wrote to memory of 2772 856 ptSrv.exe 33 PID 856 wrote to memory of 2772 856 ptSrv.exe 33 PID 856 wrote to memory of 2772 856 ptSrv.exe 33 PID 856 wrote to memory of 2772 856 ptSrv.exe 33 PID 856 wrote to memory of 2772 856 ptSrv.exe 33 PID 2772 wrote to memory of 2164 2772 cmd.exe 35 PID 2772 wrote to memory of 2164 2772 cmd.exe 35 PID 2772 wrote to memory of 2164 2772 cmd.exe 35 PID 2772 wrote to memory of 2164 2772 cmd.exe 35 PID 2772 wrote to memory of 2164 2772 cmd.exe 35 PID 2772 wrote to memory of 2164 2772 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\List of suspected clients.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" start ptSrv.exe; start moorefiles.pdf2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵PID:2164
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\moorefiles.pdf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59173207252e9f55e4b3f694426fc0436
SHA12bc97ac7eea547e687341785d4e155e71a1aa8bd
SHA256bec38425519057867a238dcf4d35ed71bf1d5854f46a4241eae4fb40e2fdd7bc
SHA512916289db6adb0bce45a31b07c55f1b539d29aa16d3c8b0cc0a62dc057e6fd93d9f29a9ab4cc355447e5629e6a3d71026e3841c8ef64d6267ef2c109d09afb643
-
Filesize
3KB
MD550764ab66c85ba8d8f97a2420eef92d5
SHA11e5281376faf891806183e1fb2e3ce7461c3167a
SHA2568b064f034983bf63846847fce0c00790d67ef6c3ce57beb3423c04b0f19db95e
SHA512936f2cfc7c4082c5a1c76d390c5f4eddceabbe6b0791fa456193a5c04c1749158ec92405ad29bd3905054d3c46f77c836d2b1268c854ac655471ee67afe7ee74
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
41KB
MD5cd162f403f22216679f486ffa15fa534
SHA1dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9
SHA2569f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2
SHA512b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e
-
Filesize
875KB
MD5a12fc5b2c56174be480fc3c720c7fcdd
SHA148cc8b9a3cd29bcc57a244dee5300d02e2487cf0
SHA256c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2
SHA5128abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1
-
Filesize
103KB
MD5530af153319a8254261d2de81b40cfe7
SHA163c7fb08e4dfe1e1cbd40a0fb333472822daa60a
SHA256098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3
SHA5126a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
202KB
MD564179e64675e822559cac6652298bdfc
SHA1cceed3b2441146762512918af7bf7f89fb055583
SHA256c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
SHA512ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280