Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/12/2024, 02:36 UTC

General

  • Target

    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe

  • Size

    1.1MB

  • MD5

    fc1b25a4b630e5080fd4004eb3929f50

  • SHA1

    62bb01b654398961a3f2079346eef8c33b874d37

  • SHA256

    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724

  • SHA512

    dd6d543c4687a398abdd8aa73f795ecda60a6222132e675f6c3b4cb4d2ca25d42b0e5a3f46f7e98fb8285a4bb44b4891f018c51bed0360784f89ced0417e5e2c

  • SSDEEP

    24576:TjlIhSPd+p4mW33YHtYGPfU+Yl10PzhnVY5zbwfSxlN:Tjl+SPsp4KHtbPf4uxVYBT

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.210.150.17:56887

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-OPLFYE

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    "C:\Users\Admin\AppData\Local\Temp\724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
      "C:\Users\Admin\AppData\Local\Temp\724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2524

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    75.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    75.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    17.150.210.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    17.150.210.192.in-addr.arpa
    IN PTR
    Response
    17.150.210.192.in-addr.arpa
    IN PTR
    192-210-150-17-host colocrossingcom
  • flag-us
    DNS
    geoplugin.net
    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    Remote address:
    8.8.8.8:53
    Request
    geoplugin.net
    IN A
    Response
    geoplugin.net
    IN A
    178.237.33.50
  • flag-nl
    GET
    http://geoplugin.net/json.gp
    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    Remote address:
    178.237.33.50:80
    Request
    GET /json.gp HTTP/1.1
    Host: geoplugin.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Fri, 13 Dec 2024 02:36:44 GMT
    server: Apache
    content-length: 954
    content-type: application/json; charset=utf-8
    cache-control: public, max-age=300
    access-control-allow-origin: *
  • flag-us
    DNS
    50.33.237.178.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.33.237.178.in-addr.arpa
    IN PTR
    Response
    50.33.237.178.in-addr.arpa
    IN CNAME
    50.32/27.178.237.178.in-addr.arpa
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    134.130.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.130.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • 192.210.150.17:56887
    tls
    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    3.6kB
    1.6kB
    14
    17
  • 178.237.33.50:80
    http://geoplugin.net/json.gp
    http
    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    623 B
    1.3kB
    12
    3

    HTTP Request

    GET http://geoplugin.net/json.gp

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    75.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    75.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    17.150.210.192.in-addr.arpa
    dns
    73 B
    123 B
    1
    1

    DNS Request

    17.150.210.192.in-addr.arpa

  • 8.8.8.8:53
    geoplugin.net
    dns
    724ac28c0e0981a385e4bec55724bc13f9528053ff32ec166c881ca409894724.exe
    59 B
    75 B
    1
    1

    DNS Request

    geoplugin.net

    DNS Response

    178.237.33.50

  • 8.8.8.8:53
    50.33.237.178.in-addr.arpa
    dns
    72 B
    155 B
    1
    1

    DNS Request

    50.33.237.178.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    134.130.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    134.130.81.91.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.144.22.2.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2524-25-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-26-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-34-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-33-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-32-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-31-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-30-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-29-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-28-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-27-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-18-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-11-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-12-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-14-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-24-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-15-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-20-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-19-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2524-21-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/3136-17-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/3136-1-0x00000000008E0000-0x00000000009FC000-memory.dmp

    Filesize

    1.1MB

  • memory/3136-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/3136-10-0x000000000C570000-0x000000000C60C000-memory.dmp

    Filesize

    624KB

  • memory/3136-9-0x0000000009410000-0x00000000094D4000-memory.dmp

    Filesize

    784KB

  • memory/3136-8-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/3136-7-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/3136-6-0x0000000005920000-0x0000000005946000-memory.dmp

    Filesize

    152KB

  • memory/3136-5-0x0000000005590000-0x000000000559A000-memory.dmp

    Filesize

    40KB

  • memory/3136-4-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/3136-3-0x00000000053E0000-0x0000000005472000-memory.dmp

    Filesize

    584KB

  • memory/3136-2-0x0000000005990000-0x0000000005F34000-memory.dmp

    Filesize

    5.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.