Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 19:10

General

  • Target

    List of suspected clients/ptSrv.exe

  • Size

    202KB

  • MD5

    64179e64675e822559cac6652298bdfc

  • SHA1

    cceed3b2441146762512918af7bf7f89fb055583

  • SHA256

    c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9

  • SHA512

    ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280

  • SSDEEP

    3072:EMtKztOp6KfOQqoY3ltdNjlcwsSdplkrxf+Uyecgw:ELKfOQLY3l9jlcwnlUf+z7gw

Score
10/10

Malware Config

Extracted

Family

remcos

Version

4.9.2 Light

Botnet

RemoteHost

C2

66.154.102.133:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-W6WVSY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe
    "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptSrv.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe
      "C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3672
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          4⤵
            PID:540
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5036

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3a368266

        Filesize

        1.1MB

        MD5

        1fd0fe39957d50570e04b97a296e170e

        SHA1

        c05b0f695c1587b402fca10affc10c7a2da70068

        SHA256

        037d4fddc7e1fa4a878b1a138e5add1d86c26c1a7c9172567f4515ef9cc1a05c

        SHA512

        6e32246e8fc19595a8e54775d1a0595245809727460e20e72c8d346e8c7f4a89ea37ba1a759e72fa2d14b07e696d19896f93494ab317f4131f8535c212c10a2d

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\MSVCP140.dll

        Filesize

        427KB

        MD5

        71a0aa2d05e9174cefd568347bd9c70f

        SHA1

        cb9247a0fa59e47f72df7d1752424b33a903bbb2

        SHA256

        fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

        SHA512

        6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\VCRUNTIME140.dll

        Filesize

        81KB

        MD5

        16b26bc43943531d7d7e379632ed4e63

        SHA1

        565287de39649e59e653a3612478c2186096d70a

        SHA256

        346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

        SHA512

        b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\assignat.avi

        Filesize

        41KB

        MD5

        cd162f403f22216679f486ffa15fa534

        SHA1

        dfdb1dd7b3f7391f72d8dc9d2685d0d4bb50f0a9

        SHA256

        9f0134e6a033cfaefde9819834ee65c36c3807f64f205ce16779c724317efaf2

        SHA512

        b821b0cd92bbfe22c0dc75b531f410a433c2311cd73708d9da4eb63e074a5c130f8974f201eb66f55e1bf139c5714ed75b0494d082ef97eaa6abe1b523e85b4e

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ptSrv.exe

        Filesize

        202KB

        MD5

        64179e64675e822559cac6652298bdfc

        SHA1

        cceed3b2441146762512918af7bf7f89fb055583

        SHA256

        c26db97858c427d92e393396f7cb7f9e7ed8f9ce616adcc123d0ec6b055b99c9

        SHA512

        ef740b35ea5190f8ee47776af1f15ebdd54d39c84da5665e64f67ae6dd0f4b181e955e9a35319a5d0bd764972562e8f2bc44dbdf83c3bedf05674eae902e7280

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\ruffian.dbf

        Filesize

        875KB

        MD5

        a12fc5b2c56174be480fc3c720c7fcdd

        SHA1

        48cc8b9a3cd29bcc57a244dee5300d02e2487cf0

        SHA256

        c239a8ce1d3f98f86a2b8446a32dd4c433b047c339fb5a774b9723426f97f7b2

        SHA512

        8abfcca938a2a949c65a0e7b9ab5354bffd119f06b44c4a32a3c5259ecabdff06d80f70257d800394d506434ca9f4a147355746f45acf9b0ab854deb383379f1

      • C:\Users\Admin\AppData\Roaming\EXN_notepad_v3\wbxtrace.dll

        Filesize

        103KB

        MD5

        530af153319a8254261d2de81b40cfe7

        SHA1

        63c7fb08e4dfe1e1cbd40a0fb333472822daa60a

        SHA256

        098e8c03cfb1bc11bd7176326a36d07d1dc282f5acd78a272289afd16b7506b3

        SHA512

        6a5998ffa86813d2825811ae9ebe2b5f43b26d02aae73395d720c83f89820af2006a93737356b138a5d736f2364a60abed5195692d58bf1866727727ab654805

      • memory/540-40-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-42-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-46-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-45-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-44-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-43-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-41-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-39-0x0000000000BF0000-0x0000000001023000-memory.dmp

        Filesize

        4.2MB

      • memory/540-36-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/540-35-0x00007FFC0E590000-0x00007FFC0E785000-memory.dmp

        Filesize

        2.0MB

      • memory/968-21-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/968-24-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/968-23-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/968-22-0x00007FFC0E590000-0x00007FFC0E785000-memory.dmp

        Filesize

        2.0MB

      • memory/3220-0-0x0000000074A30000-0x0000000074BAB000-memory.dmp

        Filesize

        1.5MB

      • memory/3220-1-0x00007FFC0E590000-0x00007FFC0E785000-memory.dmp

        Filesize

        2.0MB

      • memory/3672-34-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/3672-32-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/3672-31-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB

      • memory/3672-28-0x00007FFC0E590000-0x00007FFC0E785000-memory.dmp

        Filesize

        2.0MB

      • memory/3672-26-0x0000000074A00000-0x0000000074B7B000-memory.dmp

        Filesize

        1.5MB