Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2024, 20:03 UTC

General

  • Target

    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe

  • Size

    893KB

  • MD5

    c016b06a4942455df9ce8a58b72bcc90

  • SHA1

    dba52afe33451c444fd5cf3c6aca9d2ced768d2c

  • SHA256

    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894c

  • SHA512

    961475a98cfdc14a29725b43c1807a3eda08a2257f50d216375faf262880ce39cf7847d00263d00fd1ce032ad14fbb003b3ab1e78bbd25b3a644f3d6746168fe

  • SSDEEP

    24576:WNo7gN9rqhq/5UqutCi1BDUTskujqA5pd6p3MFHdIvYV:QL2hq/6q1i1h4v3A5pdSOWvY

Malware Config

Extracted

Family

remcos

Botnet

cee

C2

cee.work.gd:2531

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    vlc

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    ios

  • mouse_option

    false

  • mutex

    gig-1IH5DX

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    sos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    "C:\Users\Admin\AppData\Local\Temp\e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xASiLfzXONGIW.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2784
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xASiLfzXONGIW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp25F2.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4964
    • C:\Users\Admin\AppData\Local\Temp\e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
      "C:\Users\Admin\AppData\Local\Temp\e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    72.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    cee.work.gd
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    Remote address:
    8.8.8.8:53
    Request
    cee.work.gd
    IN A
    Response
    cee.work.gd
    IN A
    154.216.19.141
  • flag-us
    DNS
    141.19.216.154.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    141.19.216.154.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    geoplugin.net
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Fri, 29 Nov 2024 20:03:44 GMT
    server: Apache
    content-length: 955
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • flag-us
    DNS
    50.33.237.178.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.33.237.178.in-addr.arpa
    IN PTR
    Response
    50.33.237.178.in-addr.arpa
    IN CNAME
    50.32/27.178.237.178.in-addr.arpa
  • flag-us
    DNS
    103.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    99.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    99.209.201.84.in-addr.arpa
    IN PTR
    Response
  • 154.216.19.141:2531
    cee.work.gd
    tls
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    3.2kB
    1.3kB
    11
    12
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    301 B
    1.3kB
    5
    3

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    72.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    72.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    cee.work.gd
    dns
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    57 B
    73 B
    1
    1

    DNS Request

    cee.work.gd

    DNS Response

    154.216.19.141

  • 8.8.8.8:53
    141.19.216.154.in-addr.arpa
    dns
    73 B
    134 B
    1
    1

    DNS Request

    141.19.216.154.in-addr.arpa

  • 8.8.8.8:53
    geoplugin.net
    dns
    e115d3bd2903d9d663a7a69edd08b0ba5f2528c831d17530bbf621648b44894cN.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

  • 8.8.8.8:53
    50.33.237.178.in-addr.arpa
    dns
    72 B
    155 B
    1
    1

    DNS Request

    50.33.237.178.in-addr.arpa

  • 8.8.8.8:53
    103.209.201.84.in-addr.arpa
    dns
    73 B
    133 B
    1
    1

    DNS Request

    103.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    99.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    99.209.201.84.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ios\logs.dat

    Filesize

    144B

    MD5

    8495a5fdbd7bc33f6086788952047ecf

    SHA1

    62ea5524d5369db74391b922b7ad7f5bedd05cb5

    SHA256

    18eeccf2463935f7aca629c03e020cde3a3b566025a64ead29ce45d55e608114

    SHA512

    fc80efa64477f1d0bad93994b473b17df2d56f9e89ae9ee7f77866487c7da0d15ce94a0c661b46a0c729c780109c96f2def1a2736908b33cffc394eb1d4fccd4

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    7416b11a58bc9d126fee754b2583b914

    SHA1

    5a01070390b0c43b4b2c622d67a9a8058372ee5c

    SHA256

    6aa6524b63796ca668fd7b7508f5a2f09b16eb51d4bf49dcdff75d9bb714c98f

    SHA512

    dacee1df925e89ed7bf8739c7a9daf79327d0de908006e703031321b075d13d59acf76d3c29cd1805c2ec727441def6bdd726fa77ab98ac6b169ac647974b1ea

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_342qrsxh.1vq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp25F2.tmp

    Filesize

    1KB

    MD5

    70c75bdf2d3fcd0c2fe828600c05842b

    SHA1

    8bee5365cba1335bac3ba924f9738c81c9053a2c

    SHA256

    10e0f1a5d139a3a18cc55eda6dc2bfc1ce29211f8e04cb5ad41eb286aeafdb75

    SHA512

    5a3de4d402aba58c89f7a964ec90dbbcf81ea2c9e346ac9d435276267521db37a2602bd1b1403bc523d5834846e5547acc2da4cdb73dd1d1f4fe46fd234de612

  • memory/1664-47-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-53-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-58-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-57-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-46-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-50-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-116-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-115-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-108-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-45-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-107-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-59-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1664-61-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1700-10-0x0000000006AE0000-0x0000000006BA0000-memory.dmp

    Filesize

    768KB

  • memory/1700-4-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1700-1-0x0000000000BF0000-0x0000000000CD6000-memory.dmp

    Filesize

    920KB

  • memory/1700-2-0x0000000005C60000-0x0000000006204000-memory.dmp

    Filesize

    5.6MB

  • memory/1700-3-0x0000000005750000-0x00000000057E2000-memory.dmp

    Filesize

    584KB

  • memory/1700-0-0x000000007474E000-0x000000007474F000-memory.dmp

    Filesize

    4KB

  • memory/1700-5-0x00000000056F0000-0x00000000056FA000-memory.dmp

    Filesize

    40KB

  • memory/1700-6-0x0000000005990000-0x0000000005A2C000-memory.dmp

    Filesize

    624KB

  • memory/1700-9-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1700-8-0x0000000005980000-0x0000000005992000-memory.dmp

    Filesize

    72KB

  • memory/1700-7-0x000000007474E000-0x000000007474F000-memory.dmp

    Filesize

    4KB

  • memory/1700-54-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-55-0x0000000005D00000-0x0000000005D1E000-memory.dmp

    Filesize

    120KB

  • memory/2784-56-0x0000000005D30000-0x0000000005D7C000-memory.dmp

    Filesize

    304KB

  • memory/2784-51-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-79-0x0000000074FF0000-0x000000007503C000-memory.dmp

    Filesize

    304KB

  • memory/2784-23-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-100-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-25-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-20-0x0000000004CC0000-0x0000000004D26000-memory.dmp

    Filesize

    408KB

  • memory/2784-91-0x0000000007260000-0x0000000007274000-memory.dmp

    Filesize

    80KB

  • memory/2784-90-0x0000000007250000-0x000000000725E000-memory.dmp

    Filesize

    56KB

  • memory/3940-18-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3940-75-0x0000000007E30000-0x00000000084AA000-memory.dmp

    Filesize

    6.5MB

  • memory/3940-76-0x00000000077E0000-0x00000000077FA000-memory.dmp

    Filesize

    104KB

  • memory/3940-77-0x0000000007860000-0x000000000786A000-memory.dmp

    Filesize

    40KB

  • memory/3940-78-0x0000000007A60000-0x0000000007AF6000-memory.dmp

    Filesize

    600KB

  • memory/3940-63-0x0000000074FF0000-0x000000007503C000-memory.dmp

    Filesize

    304KB

  • memory/3940-89-0x00000000079E0000-0x00000000079F1000-memory.dmp

    Filesize

    68KB

  • memory/3940-74-0x00000000074C0000-0x0000000007563000-memory.dmp

    Filesize

    652KB

  • memory/3940-73-0x00000000069E0000-0x00000000069FE000-memory.dmp

    Filesize

    120KB

  • memory/3940-92-0x0000000007B20000-0x0000000007B3A000-memory.dmp

    Filesize

    104KB

  • memory/3940-93-0x0000000007B00000-0x0000000007B08000-memory.dmp

    Filesize

    32KB

  • memory/3940-62-0x0000000006A80000-0x0000000006AB2000-memory.dmp

    Filesize

    200KB

  • memory/3940-36-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3940-99-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3940-24-0x0000000005ED0000-0x0000000006224000-memory.dmp

    Filesize

    3.3MB

  • memory/3940-22-0x0000000005690000-0x00000000056F6000-memory.dmp

    Filesize

    408KB

  • memory/3940-19-0x0000000005400000-0x0000000005422000-memory.dmp

    Filesize

    136KB

  • memory/3940-17-0x00000000057A0000-0x0000000005DC8000-memory.dmp

    Filesize

    6.2MB

  • memory/3940-16-0x0000000074740000-0x0000000074EF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3940-15-0x0000000002BA0000-0x0000000002BD6000-memory.dmp

    Filesize

    216KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.