Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7clocktuner...re.dll
windows7-x64
1clocktuner...re.dll
windows10-2004-x64
1clocktuner...on.dll
windows7-x64
1clocktuner...on.dll
windows10-2004-x64
1clocktuner...wn.dll
windows7-x64
1clocktuner...wn.dll
windows10-2004-x64
1clocktuner...ck.dll
windows7-x64
1clocktuner...ck.dll
windows10-2004-x64
1clocktuner...es.dll
windows7-x64
1clocktuner...es.dll
windows10-2004-x64
1clocktuner...ox.dll
windows7-x64
1clocktuner...ox.dll
windows10-2004-x64
1clocktuner...ip.dll
windows7-x64
1clocktuner...ip.dll
windows10-2004-x64
1clocktuner...ch.dll
windows7-x64
1clocktuner...ch.dll
windows10-2004-x64
1clocktuner....3.dll
windows7-x64
1clocktuner....3.dll
windows10-2004-x64
1clocktuner....1.exe
windows7-x64
10clocktuner....1.exe
windows10-2004-x64
10clocktuner...er.dll
windows7-x64
1clocktuner...er.dll
windows10-2004-x64
1clocktuner...10.dll
windows7-x64
1clocktuner...10.dll
windows10-2004-x64
1clocktuner...15.dll
windows7-x64
1clocktuner...15.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/11/2024, 17:36
Behavioral task
behavioral1
Sample
clocktuner-ryzen-2-1/Bunifu.Core.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
clocktuner-ryzen-2-1/Bunifu.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuButton.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuButton.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuDropdown.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuDropdown.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuFormDock.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuFormDock.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuPages.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuPages.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuTextbox.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuTextbox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuToolTip.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.BunifuToolTip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.ToggleSwitch.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
clocktuner-ryzen-2-1/Bunifu.UI.WinForms.ToggleSwitch.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
clocktuner-ryzen-2-1/Bunifu_UI_v1.5.3.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
clocktuner-ryzen-2-1/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
clocktuner-ryzen-2-1/CTR 2.1.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
clocktuner-ryzen-2-1/CTR 2.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
clocktuner-ryzen-2-1/Microsoft.Win32.TaskScheduler.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
clocktuner-ryzen-2-1/Microsoft.Win32.TaskScheduler.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
clocktuner-ryzen-2-1/libgmp-10.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
clocktuner-ryzen-2-1/libgmp-10.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
clocktuner-ryzen-2-1/libhwloc-15.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
clocktuner-ryzen-2-1/libhwloc-15.dll
Resource
win10v2004-20241007-en
General
-
Target
clocktuner-ryzen-2-1/CTR 2.1.exe
-
Size
3.0MB
-
MD5
ab76aea8f4d233ea72eddfccd0aa4393
-
SHA1
7348efc9021e679537573a3acef42b6861074987
-
SHA256
adaebae945e9ff06350d1be65406f8cc593bbeaab1d71f457183ef25de664aec
-
SHA512
194b0cf925c7eae1c81c88f5f39a2680a710218f5ca38ed71e150f4f5716493bcfd2da3a4ae056523f9de3aac12be432cbfe62d8b18baacaaac501ad6726fbf0
-
SSDEEP
49152:ZEA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTVd3338Z:t92bz2Eb6pd7B6bAGx7n333+
Malware Config
Extracted
remcos
New
95.217.148.142:9004
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
SSS1ooosSAweewwe-X6B4E4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 3 IoCs
pid Process 2208 CTR 2.1.exe 2160 scr_previw.exe 2904 scr_previw.exe -
Loads dropped DLL 11 IoCs
pid Process 2396 CTR 2.1.exe 2396 CTR 2.1.exe 2160 scr_previw.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2160 scr_previw.exe 2904 scr_previw.exe 1952 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 1952 2904 scr_previw.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CTR 2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CTR 2.1.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2396 CTR 2.1.exe 2396 CTR 2.1.exe 2208 CTR 2.1.exe 2208 CTR 2.1.exe 2160 scr_previw.exe 2904 scr_previw.exe 2904 scr_previw.exe 1952 cmd.exe 1952 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2904 scr_previw.exe 1952 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 CTR 2.1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 CTR 2.1.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 1488 wrote to memory of 2396 1488 CTR 2.1.exe 31 PID 2396 wrote to memory of 2208 2396 CTR 2.1.exe 32 PID 2396 wrote to memory of 2208 2396 CTR 2.1.exe 32 PID 2396 wrote to memory of 2208 2396 CTR 2.1.exe 32 PID 2396 wrote to memory of 2208 2396 CTR 2.1.exe 32 PID 2396 wrote to memory of 2160 2396 CTR 2.1.exe 33 PID 2396 wrote to memory of 2160 2396 CTR 2.1.exe 33 PID 2396 wrote to memory of 2160 2396 CTR 2.1.exe 33 PID 2396 wrote to memory of 2160 2396 CTR 2.1.exe 33 PID 2208 wrote to memory of 2776 2208 CTR 2.1.exe 34 PID 2208 wrote to memory of 2776 2208 CTR 2.1.exe 34 PID 2208 wrote to memory of 2776 2208 CTR 2.1.exe 34 PID 2160 wrote to memory of 2904 2160 scr_previw.exe 35 PID 2160 wrote to memory of 2904 2160 scr_previw.exe 35 PID 2160 wrote to memory of 2904 2160 scr_previw.exe 35 PID 2160 wrote to memory of 2904 2160 scr_previw.exe 35 PID 2904 wrote to memory of 1952 2904 scr_previw.exe 36 PID 2904 wrote to memory of 1952 2904 scr_previw.exe 36 PID 2904 wrote to memory of 1952 2904 scr_previw.exe 36 PID 2904 wrote to memory of 1952 2904 scr_previw.exe 36 PID 2904 wrote to memory of 1952 2904 scr_previw.exe 36 PID 1952 wrote to memory of 3052 1952 cmd.exe 38 PID 1952 wrote to memory of 3052 1952 cmd.exe 38 PID 1952 wrote to memory of 3052 1952 cmd.exe 38 PID 1952 wrote to memory of 3052 1952 cmd.exe 38 PID 1952 wrote to memory of 3052 1952 cmd.exe 38 PID 1952 wrote to memory of 3052 1952 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\clocktuner-ryzen-2-1\CTR 2.1.exe"C:\Users\Admin\AppData\Local\Temp\clocktuner-ryzen-2-1\CTR 2.1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\clocktuner-ryzen-2-1\CTR 2.1.exe"C:\Users\Admin\AppData\Local\Temp\clocktuner-ryzen-2-1\CTR 2.1.exe" /VERYSILENT2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\CTR 2.1\CTR 2.1.exe"C:\Users\Admin\AppData\Roaming\CTR 2.1\CTR 2.1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2208 -s 5324⤵
- Loads dropped DLL
PID:2776
-
-
-
C:\Users\Admin\AppData\Roaming\scr_previw.exe"C:\Users\Admin\AppData\Roaming\scr_previw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\Browserload\scr_previw.exeC:\Users\Admin\AppData\Roaming\Browserload\scr_previw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d4e0790650b033c5e2775b6f408f9348
SHA18a5e6d8a58bac6863423df89b2ce358085a266e2
SHA256085d11e39de9521e4fe1d6b132ff5e5e933eb178a53c1bfab2529f2f3c1b9fbc
SHA51279dbac67624ad9fd31d28b760af452996434a96b5b285ddf0ec9350cf2e485e4027835200a08c7d4524c670945d75e0c829e079a21face0a4d5a96d0f0ae59e2
-
Filesize
947KB
MD5a727c368e3a6c273f28c80607f2df861
SHA1a31a2b4a4677d58bf9f7126da6dedaf4502eb283
SHA256bc5e2a7118a6e0a37b968dca2c110dd9db9a4359f6aea13f41ac04c663d066ca
SHA512b7a47943727fced7da83f89d8eac50a50308a8a7abacf57b7ffcc0b2c05349360a8af60f3ab81755ba456b956b022c99f21692d339d399a42a5b8d9860b9045d
-
Filesize
1.9MB
MD5e8ad346c114fda96fca288966eae8e92
SHA1fdfad7f2030b54f076b2a2e24ef1199abf2588e6
SHA2567e04681fdc438855e5b27a92c73b74ccb0a13338ee24a5054571b8efd8918ba0
SHA512d63e542de66eb09d6847ed99e173763b7c24335566f650bdb198d4279b0de6e14cb4a03f29c66b5d7d6c480a6f520f677fccf8cbf51dc5db3f8af6c5412d7549
-
Filesize
15KB
MD5162ba47ec20e7fb580672579a6fef9d2
SHA1a6b52b8f549ca44ffe821f65e846b869da544c28
SHA256227baa93552cc95a5d2142c23c27f2006e41093cfe24f89bea1b8fe8abbac159
SHA512135e057a779e5ed593f455ecc646dbf0f21b0bab909e0d8c3d83c7817e82e52115551cd6710b75dbfb9026393861e6f24f63ec59722d1e73553df97ac0e55cd4
-
Filesize
947KB
MD58544704f507c57bd2fe9e2551e3abef8
SHA136acefb78fc9c67adc9bbc6b6a660f39d8ea2976
SHA256c144a4451ea558af360534ddab0cd9535c7fd897da8af71e69927936fe9b57fb
SHA5121ea63e3f45497a4dce690d572f35844e1bd64eb617ae12c4454a1a985af7de139e412e0a65dfe4760dfbe2d2f24d62913b666210fc9e8c7f5e0375d9dc5a0084
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980