Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe
-
Size
519KB
-
MD5
aaf009498fd654fe098a30d1ec1d3120
-
SHA1
d6de6ea6d8deb0b700cda51e8f366d3a333ffa29
-
SHA256
1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d
-
SHA512
6c601a13522500196ac58dc3b75ead4b438ddc149a4e1513a0657ea69be98845428f0bd76285218053532bfb59f702e091310dc92e00d9af1a7def2416581460
-
SSDEEP
6144:+xwgiJ4h+W4PQgPniiWn14owKYHvYLPG7nIsJmwu1WGFKPVMmNK1ftxU3WaN5rfx:cS4QZyn14rBHcgpJmwuAN7Cfn2v5P
Malware Config
Extracted
remcos
benchao
tochisglobal.ddns.net:6426
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-9R4HLX
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 7 IoCs
pid Process 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 520 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 520 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 520 wab.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4376 wrote to memory of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95 PID 4376 wrote to memory of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95 PID 4376 wrote to memory of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95 PID 4376 wrote to memory of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95 PID 4376 wrote to memory of 520 4376 1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe"C:\Users\Admin\AppData\Local\Temp\1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\AppData\Local\Temp\1619172a202b25aff96beb80b21fbda70ed92237a88a7a4d990f5de77b19677d.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD568d72c1e5a42d4e2efe9765c233fa9db
SHA1487003bf80daccb4a47e3d0598ba793ca2c7cdeb
SHA25604166ca33f0990293d3d53e2e39078f8c201b72d939d48642a3becf33f2f3797
SHA512c35eddae3b0a835d3b66cb757b6835c48c5fdb7b20f3a81b0384be0a3d8cbcfe0b5ac62cd55b2d6c0e551972e853f7ad0bfc0882db4518a6617fa8ddfb4fb3d4
-
Filesize
5KB
MD5af4324802813a5a897db2167fc10e291
SHA1916bd47457dcb4247743626e86492436b77bebf8
SHA25692cb3b3a7280246743543325d3fe9a7d72c63227f9540d25d5ef27b2ce8856b4
SHA512cb3e07c4558049634078808bd419860c6e2855a02bba79541cea80873fe6db58cf667a27c111521df09ef30f92c149736092c473fde28bbb5974be6d7ddab83c
-
Filesize
12KB
MD56c38da8922cc37b4bbb77de4a63ad843
SHA14e0533fd11df8bddbd543ed58df7b6060d9f4631
SHA2561624d9ad8b2e2658af224691263f64388ba3a997efe80011889e3c35237ce4c1
SHA512ad0be3d7e57da9c304e9b9cac5341b6c76b157456ab44f5579d6c38c830a31c9c3e1e9a875b8f465243c607ea2ede6b0bb77237f17a70a4d4c78606e036c3430
-
Filesize
928B
MD509ed21bd518ae86a0b1a87c2b90e009e
SHA1a54ebd3b3d02d143b11fa77eb735db1b84ff2d52
SHA256b6c4287fa773a3de08ecfa0607ab67ab7299919156f0430adbcd40afaf24c76c
SHA512bbffa224a77ccd1233b822ade2834bc7642dae4e0f761d89303e7955c688a34e1afc7766f2a061be7c59239133e828078b74f2b1b14d9eb09a493b8ec7380d90