Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 08:21
Behavioral task
behavioral1
Sample
6f0604f8a16b94b61d714dfec11d0358.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f0604f8a16b94b61d714dfec11d0358.exe
Resource
win10v2004-20241007-en
General
-
Target
6f0604f8a16b94b61d714dfec11d0358.exe
-
Size
865KB
-
MD5
6f0604f8a16b94b61d714dfec11d0358
-
SHA1
558828c2ead68ea5883655299a3f0bfad1981ae5
-
SHA256
28331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281
-
SHA512
76ebd74ec7b965ff20aad25aa6c0dfc5b7efef087f6bd4bf6f0b2f08427ac65bf320305db16ff00cebc5bfc98c8f22014ed5e7c9cedd37a05721b330326c4eb3
-
SSDEEP
24576:drl6kD68JmlotQfAVnxag+/zxRlk4t4p5G5wJm1wr:Zl328U2yfAVnsgSWpg5km
Malware Config
Extracted
remcos
RemoteHost
192.210.150.26:8787
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R1T905
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Allene.vbs Allene.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 Allene.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2060-13-0x00000000007F0000-0x00000000009CD000-memory.dmp autoit_exe behavioral2/memory/2316-34-0x0000000000F40000-0x000000000111D000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/2060-0-0x00000000007F0000-0x00000000009CD000-memory.dmp upx behavioral2/files/0x0007000000023cbb-10.dat upx behavioral2/memory/2316-11-0x0000000000F40000-0x000000000111D000-memory.dmp upx behavioral2/memory/2060-13-0x00000000007F0000-0x00000000009CD000-memory.dmp upx behavioral2/memory/2316-34-0x0000000000F40000-0x000000000111D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f0604f8a16b94b61d714dfec11d0358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Allene.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2316 Allene.exe 2316 Allene.exe 2316 Allene.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2060 6f0604f8a16b94b61d714dfec11d0358.exe 2316 Allene.exe 2316 Allene.exe 2316 Allene.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2316 2060 6f0604f8a16b94b61d714dfec11d0358.exe 82 PID 2060 wrote to memory of 2316 2060 6f0604f8a16b94b61d714dfec11d0358.exe 82 PID 2060 wrote to memory of 2316 2060 6f0604f8a16b94b61d714dfec11d0358.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f0604f8a16b94b61d714dfec11d0358.exe"C:\Users\Admin\AppData\Local\Temp\6f0604f8a16b94b61d714dfec11d0358.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Milburr\Allene.exe"C:\Users\Admin\AppData\Local\Temp\6f0604f8a16b94b61d714dfec11d0358.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD52dba67af7086f3ebefc507fd8756237c
SHA1650ba696df954e6722bdb70942351c6241e343bc
SHA256574a044815cb4fd5f8720e80be14ee47ec667f33b323a2586b8a43aa68f5d2eb
SHA512ac6866ed75360e6668c21b2813abd9c9505172acc52a24fdcb4c5cbb577463460dda83b4dd4bc5ecae493c630d0021dbaa06e52c352729f96bc5404edbe61516
-
Filesize
865KB
MD56f0604f8a16b94b61d714dfec11d0358
SHA1558828c2ead68ea5883655299a3f0bfad1981ae5
SHA25628331e2705bf58bd76a9f8ba0f0a431b762eaf6e4284dbf12f1453dd3fecf281
SHA51276ebd74ec7b965ff20aad25aa6c0dfc5b7efef087f6bd4bf6f0b2f08427ac65bf320305db16ff00cebc5bfc98c8f22014ed5e7c9cedd37a05721b330326c4eb3
-
Filesize
384KB
MD5254ee770efc6d1fe9e856b52a312b9d1
SHA1042953108b9065cdcec7adcd09498ef719fb3cc7
SHA2569db06a51e9c92695586f1e3713bc64325432ca3df37ff14e167fb4fcd3df495f
SHA512984fdb893806bfd296f7f205a858d3680192f8000dab41ea8f0e51ceb77f26be6e925c7c0c0b26b4ebd0b23f4400abcaa05719bb53943fb4735e4b5b81a8d819