Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 14:53

General

  • Target

    5d0fc271f0606b92ab5c9ad53a790cb0N.exe

  • Size

    1.8MB

  • MD5

    5d0fc271f0606b92ab5c9ad53a790cb0

  • SHA1

    c127a41f0cbd5fdb93126f99df6b411db705051c

  • SHA256

    5046511eb489387b7a835a990ea3b36b77185f3fad905511c4bce30aa654c60b

  • SHA512

    295be396acfb54e1211a54479aa628d67ba6e0658533724b9b19e904bbbc509170fe53b3d4b179a7837f766a29a83d86d24baf8fdd52ae5068b83bd5f00ed7e5

  • SSDEEP

    49152:9ayHCQ8W4dod2vKSsd4rGj8fCs4bIwaRsAOwcd0bVNtcqOjLc:UE8oQvj+wpwaqAOd0JcqY

Malware Config

Extracted

Family

remcos

Botnet

spacolombia2707RAPTOR

C2

areaseguras.con-ip.com:2707

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    loggsdSSC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc121455011-7TOVMS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d0fc271f0606b92ab5c9ad53a790cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5d0fc271f0606b92ab5c9ad53a790cb0N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\5d0fc271f0606b92ab5c9ad53a790cb0N.exe
      "C:\Users\Admin\AppData\Local\Temp\5d0fc271f0606b92ab5c9ad53a790cb0N.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\loggsdSSC\logs.dat

    Filesize

    184B

    MD5

    79e83c104dfc5dea72274727ba189bf1

    SHA1

    0e26ea42a148c624ac349ddc3f965fb005f5373d

    SHA256

    2a4d946b280cb3103096c3791bbb8c4e2d117fe436cda497507ec1edecea64c0

    SHA512

    c18b939a524865196c2ee99a487909757178bdfdc7086010bd9d8d056610038860dadefb6d5e3bfda2e4643de4fa4f3ef3f4decd9bcb6636063c069ce5ddebfe

  • memory/3408-40-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-56-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-3-0x00000000051A0000-0x0000000005368000-memory.dmp

    Filesize

    1.8MB

  • memory/3408-4-0x0000000005470000-0x00000000056CC000-memory.dmp

    Filesize

    2.4MB

  • memory/3408-16-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-14-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-30-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-36-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-54-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-60-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-68-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-66-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-64-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-62-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-58-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-34-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-52-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-51-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-48-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-46-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-42-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-0-0x0000000074E0E000-0x0000000074E0F000-memory.dmp

    Filesize

    4KB

  • memory/3408-2-0x0000000074E00000-0x00000000755B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3408-38-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-4868-0x00000000056D0000-0x000000000576A000-memory.dmp

    Filesize

    616KB

  • memory/3408-32-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-28-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-26-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-24-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-20-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-18-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-12-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-8-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-6-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-22-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-10-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-5-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-4867-0x0000000074E00000-0x00000000755B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3408-44-0x0000000005470000-0x00000000056C5000-memory.dmp

    Filesize

    2.3MB

  • memory/3408-4869-0x0000000005770000-0x00000000057BC000-memory.dmp

    Filesize

    304KB

  • memory/3408-4870-0x0000000005FF0000-0x0000000006594000-memory.dmp

    Filesize

    5.6MB

  • memory/3408-4871-0x0000000005850000-0x00000000058A4000-memory.dmp

    Filesize

    336KB

  • memory/3408-4877-0x0000000074E00000-0x00000000755B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3408-1-0x00000000006A0000-0x0000000000878000-memory.dmp

    Filesize

    1.8MB

  • memory/4616-4895-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4616-4878-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB