Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe
Resource
win10v2004-20240412-en
General
-
Target
729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe
-
Size
24KB
-
MD5
fab8548874584d852c528aa322d3b028
-
SHA1
4a9ea79bbdcaacb00e49d3cd46f3f16834e63800
-
SHA256
729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a
-
SHA512
b43e73baf6d93f4e3d8c685bb354e53fb6edf8b6c1d79e8b1d7ccb488298c88289443c9313612515918fa9062f9a4bddbf74c0b1768b6dfe6b76d0628f831cd0
-
SSDEEP
384:Yek4gJeT99HsJhy2zQEmde4CnQhczvVp3d3uE6jLhnOl4D/CSWMlSqeTo2hZlw:lk0T9NsJhy2zQEmde4CQhczvVp3d3u3R
Malware Config
Extracted
remcos
awo
103.67.196.125:4505
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-IXY4DW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a = "C:\\Users\\Admin\\Documents\\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.pif" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4544 set thread context of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3172 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4544 wrote to memory of 5192 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 89 PID 4544 wrote to memory of 5192 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 89 PID 4544 wrote to memory of 5192 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 89 PID 5192 wrote to memory of 4736 5192 cmd.exe 91 PID 5192 wrote to memory of 4736 5192 cmd.exe 91 PID 5192 wrote to memory of 4736 5192 cmd.exe 91 PID 4544 wrote to memory of 3016 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 92 PID 4544 wrote to memory of 3016 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 92 PID 4544 wrote to memory of 3016 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 92 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94 PID 4544 wrote to memory of 3172 4544 729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe"C:\Users\Admin\AppData\Local\Temp\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a" /t REG_SZ /F /D "C:\Users\Admin\Documents\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.pif"2⤵
- Suspicious use of WriteProcessMemory
PID:5192 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a" /t REG_SZ /F /D "C:\Users\Admin\Documents\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.pif"3⤵
- Adds Run key to start application
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c Copy "C:\Users\Admin\AppData\Local\Temp\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe" "C:\Users\Admin\Documents\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.pif"2⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe"C:\Users\Admin\AppData\Local\Temp\729038a854a7fdd96dc12d7617b353b0b732afa745d292ce0aff5581718f633a.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5bc3393fca0b1fe786c456c2d27ecf6b6
SHA1455b86e201c0a28d361e30f023d12c11a085bd68
SHA256bee1ef1b96850beb65c34a4b9874bd563c6cccffec480249e787825a73b5f893
SHA512af1e6769ace76471d8b56ea876e82ae332c0fb22c2ce9c3177079674a31e51adafac1d61b416d0f2f4bec80a1053b219263e8bac2f10945044573b1740bfeedd