Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 08:31 UTC

General

  • Target

    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe

  • Size

    1.2MB

  • MD5

    996a89239876fdbb1cf03d17d092f9cb

  • SHA1

    f068e983f491a47ed418c52ac57e453a043bd9d6

  • SHA256

    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f

  • SHA512

    dfb8a52574e5d0d5f553334906dd0df5510662bdfe093b85042a66145c33401244f2cb28e51c2231e11fffe49852307751c135aefe55d4330b86ede3894f4a19

  • SSDEEP

    24576:S6inYmOMJ+FU3WZvTS8ms6xAPe635AZx/2l86N:SWmtA63WZ3v6S2635AZMhN

Malware Config

Extracted

Family

remcos

Botnet

Host

C2

oyo.work.gd:3142

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    vlc

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    pdf

  • mouse_option

    false

  • mutex

    jkm-I9KENP

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    ios

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    "C:\Users\Admin\AppData\Local\Temp\34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Users\Admin\AppData\Local\Temp\34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
      "C:\Users\Admin\AppData\Local\Temp\34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    71.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    71.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    oyo.work.gd
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    8.8.8.8:53
    Request
    oyo.work.gd
    IN A
    Response
    oyo.work.gd
    IN A
    154.216.20.185
  • flag-us
    DNS
    oyo.work.gd
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    8.8.8.8:53
    Request
    oyo.work.gd
    IN A
    Response
    oyo.work.gd
    IN A
    154.216.20.185
  • flag-us
    DNS
    oyo.work.gd
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    8.8.8.8:53
    Request
    oyo.work.gd
    IN A
  • flag-us
    DNS
    oyo.work.gd
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    8.8.8.8:53
    Request
    oyo.work.gd
    IN A
  • flag-us
    DNS
    geoplugin.net
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Wed, 13 Nov 2024 08:32:08 GMT
    server: Apache
    content-length: 953
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • flag-us
    DNS
    185.20.216.154.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    185.20.216.154.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.33.237.178.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.33.237.178.in-addr.arpa
    IN PTR
    Response
    50.33.237.178.in-addr.arpa
    IN CNAME
    50.32/27.178.237.178.in-addr.arpa
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    75.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    75.117.19.2.in-addr.arpa
    IN PTR
    Response
    75.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-75deploystaticakamaitechnologiescom
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 154.216.20.185:3142
    oyo.work.gd
    tls
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    3.6kB
    1.6kB
    15
    17
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    577 B
    1.3kB
    11
    3

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    71.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    71.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    oyo.work.gd
    dns
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    228 B
    146 B
    4
    2

    DNS Request

    oyo.work.gd

    DNS Request

    oyo.work.gd

    DNS Request

    oyo.work.gd

    DNS Request

    oyo.work.gd

    DNS Response

    154.216.20.185

    DNS Response

    154.216.20.185

  • 8.8.8.8:53
    geoplugin.net
    dns
    34956fb0874a7093f7e246b475a97acc90e312c3c762a09f69d9933b0837f59f.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

  • 8.8.8.8:53
    185.20.216.154.in-addr.arpa
    dns
    73 B
    134 B
    1
    1

    DNS Request

    185.20.216.154.in-addr.arpa

  • 8.8.8.8:53
    50.33.237.178.in-addr.arpa
    dns
    72 B
    155 B
    1
    1

    DNS Request

    50.33.237.178.in-addr.arpa

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    213 B
    145 B
    3
    1

    DNS Request

    206.23.85.13.in-addr.arpa

    DNS Request

    206.23.85.13.in-addr.arpa

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    75.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    75.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    22.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pdf\logs.dat

    Filesize

    144B

    MD5

    5e64d1987bd678b9a0b4d37f6bf23e14

    SHA1

    9225473a88de83cf8c4129e3b1a28b5f495f921d

    SHA256

    e8af172bfc3fdb48c6ca62ee47d5cb3113738ad75fe654df1388930e9b0938e9

    SHA512

    bb9f96426b1c9ad35a540c7e153e98f99e329d0aceb8bf3a8a9d2e0c7b7d1e45b50e1752352294656ac512bbf5a911f8a3009c68e50523f5bfb34d4bc7e109e9

  • memory/2392-19-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-30-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-61-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-60-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-53-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-52-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-45-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-44-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-16-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-37-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-36-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-12-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-13-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-15-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-20-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-26-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-25-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-24-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2392-23-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3552-4-0x00000000053B0000-0x0000000005704000-memory.dmp

    Filesize

    3.3MB

  • memory/3552-9-0x00000000745FE000-0x00000000745FF000-memory.dmp

    Filesize

    4KB

  • memory/3552-21-0x00000000745F0000-0x0000000074DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3552-2-0x00000000057F0000-0x0000000005D94000-memory.dmp

    Filesize

    5.6MB

  • memory/3552-1-0x0000000000720000-0x000000000085C000-memory.dmp

    Filesize

    1.2MB

  • memory/3552-8-0x0000000005730000-0x0000000005742000-memory.dmp

    Filesize

    72KB

  • memory/3552-11-0x0000000006180000-0x0000000006240000-memory.dmp

    Filesize

    768KB

  • memory/3552-0-0x00000000745FE000-0x00000000745FF000-memory.dmp

    Filesize

    4KB

  • memory/3552-7-0x00000000745F0000-0x0000000074DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3552-6-0x0000000005F30000-0x0000000005FCC000-memory.dmp

    Filesize

    624KB

  • memory/3552-5-0x0000000005740000-0x000000000574A000-memory.dmp

    Filesize

    40KB

  • memory/3552-10-0x00000000745F0000-0x0000000074DA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3552-3-0x0000000005240000-0x00000000052D2000-memory.dmp

    Filesize

    584KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.