Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2024, 19:57 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe
Resource
win10v2004-20241007-en
General
-
Target
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe
-
Size
2.6MB
-
MD5
8e921737fd53f5a40e982495f0c7c3c9
-
SHA1
c46e2cae95d387f64964fa000b8daff2f646bdbb
-
SHA256
c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08
-
SHA512
e767b00c4ea757b4af8dd0339260f5748d2475d5b94c6c2a83d20077990379068e8bf7bbfb7b2cf1015ad4f56968456131447ab63225975d2bb5cdb2535f0fdc
-
SSDEEP
49152:rTOYjy2jq6ZutrfM2IAIbu/GFcThB84muqmSj9TgM/rhiYO/CeQTWoNdjjEPOaDT:rBIknAIbuQ2mtnhiY8dT
Malware Config
Extracted
remcos
ROJO
nuevodntestchec.addns.org:3018
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
data
-
mouse_option
false
-
mutex
jjajbsfbisfablklsafg-LEIC4X
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Downloads MZ/PE file
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SteganosSafe = "C:\\Users\\Admin\\Videos\\SteganosSafe\\SafeVideo.exe" c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2764 set thread context of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 220 set thread context of 5572 220 csc.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 csc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5572 MSBuild.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2764 wrote to memory of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 2764 wrote to memory of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 2764 wrote to memory of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 2764 wrote to memory of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 2764 wrote to memory of 220 2764 c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe 96 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100 PID 220 wrote to memory of 5572 220 csc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe"C:\Users\Admin\AppData\Local\Temp\c413b5fc353f566a47c17c56b69b2cc7b33e048673b78678d33b3aa8804d1d08.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5572
-
-
Network
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestaraguatec.addns.orgIN AResponsearaguatec.addns.orgIN A181.141.40.225
-
Remote address:8.8.8.8:53Request225.40.141.181.in-addr.arpaIN PTRResponse225.40.141.181.in-addr.arpaIN PTRhfc-181-141-40-225unenetco
-
Remote address:8.8.8.8:53Request225.40.141.181.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request225.40.141.181.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request225.40.141.181.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestcontath.orgIN AResponsecontath.orgIN A69.49.234.173
-
Remote address:69.49.234.173:443RequestGET /ROJO.exe HTTP/1.1
Host: contath.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Server: Apache
Last-Modified: Wed, 13 Nov 2024 13:51:59 GMT
Accept-Ranges: bytes
Content-Length: 492544
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdownload
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.234.49.69.in-addr.arpaIN PTRResponse173.234.49.69.in-addr.arpaIN PTR69-49-234-173 webhostboxnet
-
Remote address:8.8.8.8:53Requestnuevodntestchec.addns.orgIN AResponsenuevodntestchec.addns.orgIN A181.141.40.225
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestgeoplugin.netIN AResponsegeoplugin.netIN A178.237.33.50
-
Remote address:8.8.8.8:53Requestgeoplugin.netIN A
-
Remote address:178.237.33.50:80RequestGET /json.gp HTTP/1.1
Host: geoplugin.net
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
server: Apache
content-length: 956
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
access-control-allow-origin: *
-
Remote address:8.8.8.8:53Request103.209.201.84.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.33.237.178.in-addr.arpaIN PTRResponse50.33.237.178.in-addr.arpaIN CNAME50.32/27.178.237.178.in-addr.arpa
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
482 B 352 B 7 6
-
9.1kB 512.8kB 191 373
HTTP Request
GET https://contath.org/ROJO.exeHTTP Response
200 -
436 B 172 B 6 4
-
2.5kB 664 B 11 13
-
531 B 1.3kB 10 3
HTTP Request
GET http://geoplugin.net/json.gpHTTP Response
200
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
65 B 81 B 1 1
DNS Request
araguatec.addns.org
DNS Response
181.141.40.225
-
292 B 116 B 4 1
DNS Request
225.40.141.181.in-addr.arpa
DNS Request
225.40.141.181.in-addr.arpa
DNS Request
225.40.141.181.in-addr.arpa
DNS Request
225.40.141.181.in-addr.arpa
-
57 B 73 B 1 1
DNS Request
contath.org
DNS Response
69.49.234.173
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
72 B 114 B 1 1
DNS Request
173.234.49.69.in-addr.arpa
-
71 B 87 B 1 1
DNS Request
nuevodntestchec.addns.org
DNS Response
181.141.40.225
-
144 B 158 B 2 1
DNS Request
171.39.242.20.in-addr.arpa
DNS Request
171.39.242.20.in-addr.arpa
-
118 B 75 B 2 1
DNS Request
geoplugin.net
DNS Request
geoplugin.net
DNS Response
178.237.33.50
-
73 B 133 B 1 1
DNS Request
103.209.201.84.in-addr.arpa
-
72 B 155 B 1 1
DNS Request
50.33.237.178.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD585846c3074f3273b7dfaead3b06cb609
SHA1c9265a2b0f1b8ed42cd56fc5141cb13f0ced293d
SHA256e1e1a2810bdb9cae7f5acdf742375271ae79ccae0a5a78d3b4875d15675e43d8
SHA51268c604ca7c4f75b92b490c4f94ccaeace13865faa40cfee80d1a437169d15d4a6c0c5cbc861ab65bf83261384a8a704770441045159b2c78450cf1de909260a3