Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/03/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
Resource
win11-20240214-en
General
-
Target
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe
-
Size
958KB
-
MD5
aa3cdd5145d9fb980c061d2d8653fa8d
-
SHA1
de696701275b01ddad5461e269d7ab15b7466d6a
-
SHA256
41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2
-
SHA512
4be32b5e9eaffa8d3f4cce515717faa6259373e8dbd258b9ebc2534fd0b62aaa7043093204e43627983fe332f63d8f998a90dc1cbb74f54a18c55f67e42a8a32
-
SSDEEP
24576:PExy+NP2Gc/hgXzYRVG7mRPQeMeokqjVnlqud+/2P+A:6+Gc/hD67mJQeMhkqXfd+/9A
Malware Config
Extracted
remcos
Go!!!
dangerous.hopto.org:2404
dangerous.hopto.org:2602
91.92.242.184:2602
91.92.242.184:2404
-
audio_folder
??????????? ??????
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
taskhost.exe
-
copy_folder
System32
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
tapiui.dat
-
keylog_flag
false
-
keylog_folder
System32
-
mouse_option
false
-
mutex
???-LDKG91
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
?????????
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4644 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2567984660-2719943099-2683635618-1000\Software\Microsoft\Windows\CurrentVersion\Run\???-LDKG91 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32\\taskhost.exe\"" clip.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3924 set thread context of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 3924 wrote to memory of 2940 3924 41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe 77 PID 2940 wrote to memory of 4644 2940 clip.exe 78 PID 2940 wrote to memory of 4644 2940 clip.exe 78 PID 2940 wrote to memory of 4644 2940 clip.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe"C:\Users\Admin\AppData\Local\Temp\41376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"3⤵
- Executes dropped EXE
PID:4644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD518ad682a1f96f3faf44b4a92bba4cee8
SHA1baa12e51e501f52948e5321e5ad05a6c9e75067f
SHA256e840540406079c00b18cab60c62a95e5a884b762ef4c93e9a25af2829ec6ff88
SHA512f6b36b0da36437b36065c26abc8886de2572b7cada844137eb431e2f6266157ab7fa3fed0efb6846d0cfebe0f9a9c62a583df8d02cd102f7a9e5afa448c8fed6