Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 23:33 UTC

General

  • Target

    Portafolio Digital de Transacción Electronica 0002938248924.exe

  • Size

    4.5MB

  • MD5

    13533b986d24ba176e64c6e7f8baa0a0

  • SHA1

    20b1526c6df49a5b7b6eb3f456a8f29f011f9c6f

  • SHA256

    33dae786b8b7debb0443f3ffd7922a3366072c0f3cb8c5a14cb6168938f0eecf

  • SHA512

    5896593d110faa753e262e6f357d6767c3c9ce378c61d2c7db15cf0f720b79a7e54b940fb12fa5bb2e5421a64b94534dee68b0b16e3a6465f3532aea42b8d4be

  • SSDEEP

    49152:QyVdmxB5GSL4m35GyJZYMrbcDifMb2TaIsjE1zSOmFaTXgaFInzHpGdk5KySXINi:QybbOGyJZYMrb7fMb2nZhdQWCMfj

Malware Config

Extracted

Family

remcos

Botnet

OCTU

C2

segurosbolivar24.con-ip.com:2006

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    regist

  • mouse_option

    false

  • mutex

    ljnghvfghujkvgnasftnz-X8YJ1F

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Portafolio Digital de Transacción Electronica 0002938248924.exe
    "C:\Users\Admin\AppData\Local\Temp\Portafolio Digital de Transacción Electronica 0002938248924.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\Portafolio Digital de Transacción Electronica 0002938248924.exe
      "C:\Users\Admin\AppData\Local\Temp\Portafolio Digital de Transacción Electronica 0002938248924.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\yehvlspvhmosrlzvlxrmukbacytxldbhe.vbs"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2764

Network

  • flag-us
    DNS
    segurosbolivar24.con-ip.com
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    Remote address:
    8.8.8.8:53
    Request
    segurosbolivar24.con-ip.com
    IN A
    Response
    segurosbolivar24.con-ip.com
    IN A
    181.141.41.0
  • flag-us
    DNS
    geoplugin.net
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Tue, 08 Oct 2024 23:33:37 GMT
    server: Apache
    content-length: 955
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • 181.141.41.0:2006
    segurosbolivar24.con-ip.com
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    2.2kB
    256 B
    8
    5
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    393 B
    2.5kB
    7
    4

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    segurosbolivar24.con-ip.com
    dns
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    73 B
    89 B
    1
    1

    DNS Request

    segurosbolivar24.con-ip.com

    DNS Response

    181.141.41.0

  • 8.8.8.8:53
    geoplugin.net
    dns
    Portafolio Digital de Transacción Electronica 0002938248924.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\yehvlspvhmosrlzvlxrmukbacytxldbhe.vbs

    Filesize

    708B

    MD5

    35b74931e98c13c89b99d62e46c9048d

    SHA1

    3385c7c35d3915ae66c8f053313d2e3919c5a7c1

    SHA256

    62a93830c48cf82943e42a088c584ba84abaf1a6bc550073c2d1085b531dfffb

    SHA512

    5c9ce5d7a59683e4e8d2a3277e7c0be2ba17ecdf1bdcd186356f612e86b0cb5ccd0d9fcecaf0c9f67e700c83b7be2052581c775ac0ebcd9a13647b45c10c8854

  • memory/2244-0-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-2-0x0000000000619000-0x0000000000631000-memory.dmp

    Filesize

    96KB

  • memory/2244-1-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-6-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-5-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-8-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-14-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-16-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2244-30-0x0000000000619000-0x0000000000631000-memory.dmp

    Filesize

    96KB

  • memory/2264-19-0x0000000000400000-0x00000000008D2000-memory.dmp

    Filesize

    4.8MB

  • memory/2264-26-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-9-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-20-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-23-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-24-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-25-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-18-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-27-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2264-33-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-38-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-44-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/2264-13-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.