Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 08:10 UTC

General

  • Target

    7493ca682e62b4d976af7a820f4a079c0c7864588e6155523414519307bf13a0.exe

  • Size

    140KB

  • MD5

    826caf6828a8165a5ecdbfbc3f19e6c9

  • SHA1

    7ddc528c0f40a930d6870b98208fcdbe9bed6ad8

  • SHA256

    7493ca682e62b4d976af7a820f4a079c0c7864588e6155523414519307bf13a0

  • SHA512

    1643f1466e6d8c888723b4b5da71abb006c24a5dec9cb68c46ed306a3bb0635a693ab331f92158ac223ef1499257730bf1a16ffb496702eb0d2d020abab0df49

  • SSDEEP

    3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVS9:xP6/M+WLckOBhVmIYs

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

systemcontrol.ddns.net:45000

systemcontrol2.ddns.net:45000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    OfficeUpgrade.exe

  • copy_folder

    OfficeUpgrade

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    Upgrader.dat

  • keylog_flag

    false

  • keylog_folder

    Upgrader

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    req_khauflaoyr

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    OfficeUpgrade

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7493ca682e62b4d976af7a820f4a079c0c7864588e6155523414519307bf13a0.exe
    "C:\Users\Admin\AppData\Local\Temp\7493ca682e62b4d976af7a820f4a079c0c7864588e6155523414519307bf13a0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
      "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe
        "C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1864

Network

  • flag-us
    DNS
    systemcontrol.ddns.net
    wn2ra4ohzdr.exe
    Remote address:
    8.8.8.8:53
    Request
    systemcontrol.ddns.net
    IN A
    Response
    systemcontrol.ddns.net
    IN A
    216.218.135.118
  • flag-us
    DNS
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    Remote address:
    8.8.8.8:53
    Request
    systemcontrol2.ddns.net
    IN A
    Response
    systemcontrol2.ddns.net
    IN A
    216.218.135.118
  • 216.218.135.118:45000
    systemcontrol.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    152 B
    120 B
    3
    3
  • 216.218.135.118:45000
    systemcontrol2.ddns.net
    wn2ra4ohzdr.exe
    52 B
    40 B
    1
    1
  • 8.8.8.8:53
    systemcontrol.ddns.net
    dns
    wn2ra4ohzdr.exe
    68 B
    84 B
    1
    1

    DNS Request

    systemcontrol.ddns.net

    DNS Response

    216.218.135.118

  • 8.8.8.8:53
    systemcontrol2.ddns.net
    dns
    wn2ra4ohzdr.exe
    69 B
    85 B
    1
    1

    DNS Request

    systemcontrol2.ddns.net

    DNS Response

    216.218.135.118

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe

    Filesize

    140KB

    MD5

    19400a5fd41a12ace5c2c1158196713f

    SHA1

    2c1016a0688f4024e3ac31e01d770bad0b1728f6

    SHA256

    f97c14650a0747da569d605021fc295c71f32dae1b31ee979659088e6ecc7bc3

    SHA512

    346eaaf4f661ae2722cccd5d2b722cbd848ba4a383499deb653b10ab56b1454a790125171549d091cca39dd9298f57f557ae7241d1bdb19dac39e89b206eabb8

  • memory/1864-33-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-19-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-34-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1864-18-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-16-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-22-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-25-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1864-27-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2496-15-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-13-0x0000000000BE0000-0x0000000000C08000-memory.dmp

    Filesize

    160KB

  • memory/2496-14-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-37-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-38-0x0000000074940000-0x000000007502E000-memory.dmp

    Filesize

    6.9MB

  • memory/2788-2-0x00000000749C0000-0x00000000750AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2788-1-0x0000000001360000-0x0000000001388000-memory.dmp

    Filesize

    160KB

  • memory/2788-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB

  • memory/2788-11-0x00000000749C0000-0x00000000750AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2788-3-0x0000000000510000-0x0000000000530000-memory.dmp

    Filesize

    128KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.