Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/09/2024, 08:57
Behavioral task
behavioral1
Sample
Trojan.Win32.Remcos.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Remcos.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Remcos.exe
-
Size
469KB
-
MD5
22ce3d0fc9f92829be87f978fc573680
-
SHA1
2a55144aed0886304b490fbcc623be46a8871065
-
SHA256
8741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
-
SHA512
6bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSEn9:WiLJbpI7I2WhQqZ7E9
Malware Config
Extracted
remcos
COM Surrogate
stay-daughters.gl.at.ply.gg:43206
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
COM Surrogate.exe
-
copy_folder
COM Surrogate
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows
-
mouse_option
false
-
mutex
Rmc-C5SENV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
COM Surrogate
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2088 COM Surrogate.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 cmd.exe 2104 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" Trojan.Win32.Remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" Trojan.Win32.Remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "\"C:\\ProgramData\\COM Surrogate\\COM Surrogate.exe\"" COM Surrogate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2088 set thread context of 1032 2088 COM Surrogate.exe 34 PID 1032 set thread context of 2756 1032 iexplore.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2088 COM Surrogate.exe 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2204 2292 Trojan.Win32.Remcos.exe 30 PID 2292 wrote to memory of 2204 2292 Trojan.Win32.Remcos.exe 30 PID 2292 wrote to memory of 2204 2292 Trojan.Win32.Remcos.exe 30 PID 2292 wrote to memory of 2204 2292 Trojan.Win32.Remcos.exe 30 PID 2204 wrote to memory of 2104 2204 WScript.exe 31 PID 2204 wrote to memory of 2104 2204 WScript.exe 31 PID 2204 wrote to memory of 2104 2204 WScript.exe 31 PID 2204 wrote to memory of 2104 2204 WScript.exe 31 PID 2104 wrote to memory of 2088 2104 cmd.exe 33 PID 2104 wrote to memory of 2088 2104 cmd.exe 33 PID 2104 wrote to memory of 2088 2104 cmd.exe 33 PID 2104 wrote to memory of 2088 2104 cmd.exe 33 PID 2088 wrote to memory of 1032 2088 COM Surrogate.exe 34 PID 2088 wrote to memory of 1032 2088 COM Surrogate.exe 34 PID 2088 wrote to memory of 1032 2088 COM Surrogate.exe 34 PID 2088 wrote to memory of 1032 2088 COM Surrogate.exe 34 PID 2088 wrote to memory of 1032 2088 COM Surrogate.exe 34 PID 1032 wrote to memory of 2756 1032 iexplore.exe 35 PID 1032 wrote to memory of 2756 1032 iexplore.exe 35 PID 1032 wrote to memory of 2756 1032 iexplore.exe 35 PID 1032 wrote to memory of 2756 1032 iexplore.exe 35 PID 1032 wrote to memory of 2756 1032 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Remcos.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Remcos.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\COM Surrogate\COM Surrogate.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\ProgramData\COM Surrogate\COM Surrogate.exe"C:\ProgramData\COM Surrogate\COM Surrogate.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2756
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530B
MD514ddca32f8cf253165c5dffbe60cadd0
SHA10638b0cd74545b3091b8d768ee74c491e1539a07
SHA256a3cf31b38dff458f3f828fbe14dc548f25b71c5ab6911f388b5bcf22f6a75eae
SHA512c5fb16609304cc243f57eb765a3632676f1c7837ba0832d747ef19de992520607d728a5729e6c935c58fb9b0236664b3618b83fdc43195a123dbe22d51a0aad0
-
Filesize
414B
MD501ea74daf9b956185c45016b68449bb0
SHA19d1a18d2c9a9f5ee04dc864adcd92f05577e9392
SHA2561b22904a4106604da03fd63fad1663a3562f928fbe6bfc90af4b8239142e83da
SHA51235566d72fc5739044bcb0ff14741c25aa0892fb6de57831eca737eb6896cd9c1c0837133504cf8df415a8e66196c317b86123967507d39814d3faaf989f8da02
-
Filesize
469KB
MD522ce3d0fc9f92829be87f978fc573680
SHA12a55144aed0886304b490fbcc623be46a8871065
SHA2568741e2fc5b709526eaec1e791c56c7d2c65f312940b81e6027bd6ee2b181d940
SHA5126bcd798e8db887dc0822ba196c2d9efb96fbe604f3728069d0bff04d5862c0d2ac2b4b2d810f310a2ec211e8244ce078b93d72debf427099dbce8f2420d88f4c