Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
Resource
win10v2004-20240910-en
General
-
Target
bc7c2b5cecb62ddda8ab33eaaa7abf65.exe
-
Size
3.7MB
-
MD5
bc7c2b5cecb62ddda8ab33eaaa7abf65
-
SHA1
e8ea016e57a0e87b90f8afbce0eee6bc1afd8bfb
-
SHA256
0e875809afec874bbbdd8395efac33c3e57bd86a66ae4097c87b35656b64804c
-
SHA512
6a57c650fad469b71f81fa488a555919f7dccfe45b501b0930285a36dc4e705faa710bf6a0c27828ec720494c89baa8d7d95fc6e752f6221f7a32bf1abcfa112
-
SSDEEP
49152:DC8nc/DY7yJiS/t8Tk6SRdkpvRFpybpxNYPMI3+bEmnT:DCv/lRRd8FpybHaEIy
Malware Config
Extracted
remcos
XOAOAMORT
carroosmfjdjs.con-ip.com:1661
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BTGK97
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SatPCEditor = "C:\\Users\\Admin\\Music\\SatPCUpdater\\SatPCOculus.exe" bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3672 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4740 wrote to memory of 3672 4740 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 94 PID 4740 wrote to memory of 3672 4740 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 94 PID 4740 wrote to memory of 3672 4740 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 94 PID 4740 wrote to memory of 3672 4740 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 94 PID 4740 wrote to memory of 3672 4740 bc7c2b5cecb62ddda8ab33eaaa7abf65.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"C:\Users\Admin\AppData\Local\Temp\bc7c2b5cecb62ddda8ab33eaaa7abf65.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD570be436c8f8dd598d9a468f55ffa67b5
SHA1e822cab3e7779e4f15a5c59124c02c527d06ad91
SHA256876892bce4d0e27c8fa567dc10fd4d9e801cb1eec9230f5664aeb50d44482345
SHA512255f3261a8b55e9c08f0e85a32d3b1161f5f02ff7a5d233da32fad011baf59794eea39f75810430ae73c42c6450e059cce36c19a3527112e442898acf4a5010f