Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2024, 02:05 UTC

General

  • Target

    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe

  • Size

    481KB

  • MD5

    9a4bd8b2b98dbf3ede74d2bc1eb19510

  • SHA1

    b11b6ec9ef56c2a4d75137e25dce5bf6f9120a3d

  • SHA256

    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9

  • SHA512

    06ff3ee21e4c8deca887fc4c479ab9769f71e3e4625e81f082c60734241677f6d12c36a50ed72cb2dfb8b0b82c3beba8f8bce3e4e0673897e119730cc0df09ab

  • SSDEEP

    12288:tuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSe+DY:g09AfNIEYsunZvZ19Z9s

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    "C:\Users\Admin\AppData\Local\Temp\0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2120

Network

  • flag-us
    DNS
    wins.coemprsasltda.pro
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    Remote address:
    8.8.8.8:53
    Request
    wins.coemprsasltda.pro
    IN A
    Response
    wins.coemprsasltda.pro
    IN A
    152.202.233.48
  • flag-us
    DNS
    geoplugin.net
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Thu, 05 Dec 2024 02:05:32 GMT
    server: Apache
    content-length: 956
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • 152.202.233.48:3000
    wins.coemprsasltda.pro
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    2.8kB
    716 B
    11
    14
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    623 B
    1.3kB
    12
    3

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    wins.coemprsasltda.pro
    dns
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    68 B
    84 B
    1
    1

    DNS Request

    wins.coemprsasltda.pro

    DNS Response

    152.202.233.48

  • 8.8.8.8:53
    geoplugin.net
    dns
    0a06e08f4bce958a25903a1217c51acaff718efec49020ceb3c724684e9a12a9.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    1f1e7eee04e5aeea6250f146e6f4ddf7

    SHA1

    bd74aa6eee44a948a001ac0083f4c16a5e6627a0

    SHA256

    e740377860796ab0807e0018968b196d2b2fee92eea5ebef7b1a890d9ee805db

    SHA512

    976468ad2030881f709a7a08a6db22dca4a9f1c82d77b007ff021ae930478ee23f1b611e42de36a7e396ebdcec6f4345a363aaf9e40a6172461ff9d2808bdf7c

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.