Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2025, 02:20 UTC

General

  • Target

    425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe

  • Size

    981KB

  • MD5

    164b1d640db37d9f5c95c23d816ffd69

  • SHA1

    5fff09a87a47d38077a08aa917bab542e8317682

  • SHA256

    425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab

  • SHA512

    067bb44a7871b2ea63780cc2a3ea01000d742490b1e65e3211fbd9f3c004d03002689a4575077cc6a34ff36af073897afad0d526f5fc9aecb05b491143370df6

  • SSDEEP

    24576:ubmYZg5hIgJsKsVWArhOX79ObyTUk9GgnAn1bij:w9JgEWymbTU1gk0j

Malware Config

Extracted

Family

remcos

Botnet

RemcoHost

C2

31.13.224.237:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-VETI36

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
    "C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2104
    • C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
      "C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe"
      2⤵
        PID:4976
      • C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        "C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe"
        2⤵
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
          "C:\Users\Admin\AppData\Local\Temp\425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1444

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        13.86.106.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.86.106.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        228.249.119.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        228.249.119.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        200.163.202.172.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        200.163.202.172.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        260 B
        5
      • 31.13.224.237:2404
        425fae95f11030526dd3a7e8dd94e93a52146be446be6095a96f1af53b13deab.exe
        104 B
        2
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        13.86.106.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        13.86.106.20.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        228.249.119.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        228.249.119.40.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        200.163.202.172.in-addr.arpa
        dns
        74 B
        160 B
        1
        1

        DNS Request

        200.163.202.172.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g5bafsmt.b5z.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1444-75-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-74-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-16-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-18-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-80-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-79-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-78-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-77-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-12-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-76-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-17-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-73-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-72-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-71-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-70-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-69-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-68-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-13-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/1444-14-0x0000000000400000-0x000000000047F000-memory.dmp

        Filesize

        508KB

      • memory/2104-39-0x0000000005C50000-0x0000000005C9C000-memory.dmp

        Filesize

        304KB

      • memory/2104-59-0x00000000071E0000-0x0000000007276000-memory.dmp

        Filesize

        600KB

      • memory/2104-23-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2104-24-0x0000000004D10000-0x0000000005338000-memory.dmp

        Filesize

        6.2MB

      • memory/2104-25-0x0000000004C60000-0x0000000004C82000-memory.dmp

        Filesize

        136KB

      • memory/2104-26-0x0000000005440000-0x00000000054A6000-memory.dmp

        Filesize

        408KB

      • memory/2104-19-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

        Filesize

        4KB

      • memory/2104-27-0x00000000054B0000-0x0000000005516000-memory.dmp

        Filesize

        408KB

      • memory/2104-37-0x0000000005620000-0x0000000005974000-memory.dmp

        Filesize

        3.3MB

      • memory/2104-38-0x0000000005C20000-0x0000000005C3E000-memory.dmp

        Filesize

        120KB

      • memory/2104-22-0x0000000002310000-0x0000000002346000-memory.dmp

        Filesize

        216KB

      • memory/2104-41-0x00000000715C0000-0x000000007160C000-memory.dmp

        Filesize

        304KB

      • memory/2104-51-0x0000000006210000-0x000000000622E000-memory.dmp

        Filesize

        120KB

      • memory/2104-40-0x0000000006BE0000-0x0000000006C12000-memory.dmp

        Filesize

        200KB

      • memory/2104-52-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2104-54-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2104-53-0x0000000006E30000-0x0000000006ED3000-memory.dmp

        Filesize

        652KB

      • memory/2104-55-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2104-56-0x00000000075B0000-0x0000000007C2A000-memory.dmp

        Filesize

        6.5MB

      • memory/2104-57-0x0000000006F60000-0x0000000006F7A000-memory.dmp

        Filesize

        104KB

      • memory/2104-58-0x0000000006FD0000-0x0000000006FDA000-memory.dmp

        Filesize

        40KB

      • memory/2104-20-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2104-60-0x0000000007160000-0x0000000007171000-memory.dmp

        Filesize

        68KB

      • memory/2104-61-0x0000000007190000-0x000000000719E000-memory.dmp

        Filesize

        56KB

      • memory/2104-62-0x00000000071A0000-0x00000000071B4000-memory.dmp

        Filesize

        80KB

      • memory/2104-63-0x00000000072A0000-0x00000000072BA000-memory.dmp

        Filesize

        104KB

      • memory/2104-64-0x0000000007280000-0x0000000007288000-memory.dmp

        Filesize

        32KB

      • memory/2104-67-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-6-0x0000000005280000-0x000000000531C000-memory.dmp

        Filesize

        624KB

      • memory/2588-9-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

        Filesize

        4KB

      • memory/2588-8-0x00000000067F0000-0x000000000680C000-memory.dmp

        Filesize

        112KB

      • memory/2588-7-0x0000000006700000-0x00000000067F2000-memory.dmp

        Filesize

        968KB

      • memory/2588-11-0x00000000069F0000-0x0000000006AB2000-memory.dmp

        Filesize

        776KB

      • memory/2588-21-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-10-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-5-0x00000000051A0000-0x00000000051AA000-memory.dmp

        Filesize

        40KB

      • memory/2588-4-0x0000000074CD0000-0x0000000075480000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-3-0x0000000004FD0000-0x0000000005062000-memory.dmp

        Filesize

        584KB

      • memory/2588-2-0x00000000054E0000-0x0000000005A84000-memory.dmp

        Filesize

        5.6MB

      • memory/2588-1-0x0000000000500000-0x00000000005FC000-memory.dmp

        Filesize

        1008KB

      • memory/2588-0-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

        Filesize

        4KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.