Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1List of su...ts.lnk
windows7-x64
10List of su...ts.lnk
windows10-2004-x64
10List of su...ll.dll
windows7-x64
1List of su...ll.dll
windows10-2004-x64
1List of su...es.pdf
windows7-x64
1List of su...es.pdf
windows10-2004-x64
1List of su...40.dll
windows7-x64
3List of su...40.dll
windows10-2004-x64
3List of su...gr.dll
windows7-x64
1List of su...gr.dll
windows10-2004-x64
3List of su...rv.exe
windows7-x64
10List of su...rv.exe
windows10-2004-x64
10List of su...dt.dll
windows7-x64
1List of su...dt.dll
windows10-2004-x64
1List of su...40.dll
windows7-x64
List of su...40.dll
windows10-2004-x64
3List of su...ce.dll
windows7-x64
1List of su...ce.dll
windows10-2004-x64
3Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
List of suspected clients/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
List of suspected clients/WCLDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
List of suspected clients/moorefiles.pdf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
List of suspected clients/moorefiles.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
List of suspected clients/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
List of suspected clients/msvcp140.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
List of suspected clients/ptMgr.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
List of suspected clients/ptMgr.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
List of suspected clients/ptSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
List of suspected clients/ptSrv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
List of suspected clients/ptusredt.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
List of suspected clients/ptusredt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
List of suspected clients/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
List of suspected clients/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
List of suspected clients/wbxtrace.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
List of suspected clients/wbxtrace.dll
Resource
win10v2004-20240226-en
General
-
Target
List of suspected clients/ptSrv.exe
-
Size
202KB
-
MD5
64179e64675e822559cac6652298bdfc
-
SHA1
cceed3b2441146762512918af7bf7f89fb055583
-
SHA256
c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
-
SHA512
ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280
-
SSDEEP
3072:EMtKztOp6KfOQqoY3ltdNjlcwsSdplkrxf+Uyecgw:ELKfOQLY3l9jlcwnlUf+z7gw
Malware Config
Extracted
remcos
4.9.2 Light
RemoteHost
66.154.102.133:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-W6WVSY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 968 set thread context of 3672 968 ptSrv.exe 102 -
Executes dropped EXE 1 IoCs
pid Process 968 ptSrv.exe -
Loads dropped DLL 3 IoCs
pid Process 968 ptSrv.exe 968 ptSrv.exe 968 ptSrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3220 ptSrv.exe 968 ptSrv.exe 968 ptSrv.exe 968 ptSrv.exe 3672 cmd.exe 3672 cmd.exe 3672 cmd.exe 3672 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 968 ptSrv.exe 3672 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3220 wrote to memory of 968 3220 ptSrv.exe 100 PID 3220 wrote to memory of 968 3220 ptSrv.exe 100 PID 3220 wrote to memory of 968 3220 ptSrv.exe 100 PID 968 wrote to memory of 3672 968 ptSrv.exe 102 PID 968 wrote to memory of 3672 968 ptSrv.exe 102 PID 968 wrote to memory of 3672 968 ptSrv.exe 102 PID 968 wrote to memory of 3672 968 ptSrv.exe 102 PID 3672 wrote to memory of 540 3672 cmd.exe 115 PID 3672 wrote to memory of 540 3672 cmd.exe 115 PID 3672 wrote to memory of 540 3672 cmd.exe 115 PID 3672 wrote to memory of 540 3672 cmd.exe 115 PID 3672 wrote to memory of 540 3672 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵PID:540
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51fd0fe39957d50570e04b97a296e170e
SHA1c05b0f695c1587b402fca10affc10c7a2da70068
SHA256037d4fddc7e1fa4a878b1a138e5add1d86c26c1a7c9172567f4515ef9cc1a05c
SHA5126e32246e8fc19595a8e54775d1a0595245809727460e20e72c8d346e8c7f4a89ea37ba1a759e72fa2d14b07e696d19896f93494ab317f4131f8535c212c10a2d
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
41KB
MD5cd162f403f22216679f486ffa15fa534
SHA1dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9
SHA2569f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2
SHA512b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e
-
Filesize
202KB
MD564179e64675e822559cac6652298bdfc
SHA1cceed3b2441146762512918af7bf7f89fb055583
SHA256c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9
SHA512ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280
-
Filesize
875KB
MD5a12fc5b2c56174be480fc3c720c7fcdd
SHA148cc8b9a3cd29bcc57a244dee5300d02e2487cf0
SHA256c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2
SHA5128abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1
-
Filesize
103KB
MD5530af153319a8254261d2de81b40cfe7
SHA163c7fb08e4dfe1e1cbd40a0fb333472822daa60a
SHA256098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3
SHA5126a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805