Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17/01/2025, 18:56

General

  • Target

    formulario_agendamiento_citas.msi

  • Size

    2.8MB

  • MD5

    86e199f73f01385585066e288c1738f3

  • SHA1

    c7aaa0ed3d4177a71469667f617602b9517f2a48

  • SHA256

    bcbcecf559e1506a12291cf270d6255f392a513ebca9464393d0a90efbaf9e63

  • SHA512

    3d2a11d4093a90f5437e6c93c86473c6d773942aac9b66424d0e31d28c3016aa41b654742a5a98ec1aa9634e5a84f95498fef520c75a55dfbae022ad844f1756

  • SSDEEP

    49152:x4WwasPIAyw9AiOFkw8xKBmk0PvpiUJjcW1gq+r6cWq7HSdqO0:CRnAA5POFl0KEBpiUJwW1gBTV7+0

Malware Config

Extracted

Family

remcos

Botnet

OCTUBRE 01 MUCHACHA

C2

imaxatmonk.imaxatmonk.com:2204

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Acobatlg.exe

  • copy_folder

    edqelofh

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    bhgoktys

  • mouse_option

    false

  • mutex

    fnahofkts-AL3Z2Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 19 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\formulario_agendamiento_citas.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4616
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:4
      2⤵
        PID:3668
      • C:\Users\Admin\AppData\Local\Commandership\ManyCam.exe
        "C:\Users\Admin\AppData\Local\Commandership\ManyCam.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\Windows\system32\pcaui.exe
          "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Commandership\ManyCam.exe"
          3⤵
            PID:2348
          • C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\ManyCam.exe
            C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\ManyCam.exe
            3⤵
            • Suspicious use of SetThreadContext
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1184
            • C:\Windows\system32\pcaui.exe
              "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\ManyCam.exe"
              4⤵
                PID:2924
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\SysWOW64\cmd.exe
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:5052
                • C:\Users\Admin\AppData\Local\Temp\Krycontrol_v5.exe
                  C:\Users\Admin\AppData\Local\Temp\Krycontrol_v5.exe
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2552
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:800

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57bebd.rbs

          Filesize

          9KB

          MD5

          fbb772c76585c3d987b18687ea3ab38a

          SHA1

          80c8a3ed7280fafe12ea9cf000022a414da4ec9c

          SHA256

          35994e586031f7d508702e50c9a66e1bfb67181d578052f53fee9e35b477b057

          SHA512

          6cf850ce30a64c0e1a9dea2f9bae3ad9bf83486b9d5b79d29f62ca7165cacaa6eb14710626cff7bbfbd163229ca80fda294b019190e4fbbc9ceb612cf72ed268

        • C:\ProgramData\bhgoktys\logs.dat

          Filesize

          144B

          MD5

          0c53cda34a908790b8d72f21bb360740

          SHA1

          03af78970d0b16a3e2e71dd30b566f1e461306ed

          SHA256

          da16a581c31ff19783215e8a2fec776b9422a33d34529362d7aa9c213034a9c1

          SHA512

          a7d5769230fa5c998ab5f26e7ae02ee43299b8ed896398002eac19bab920a978f9c1258348c29ce10ec5a7354b9cd058c57590bfeaab98d823ebcd2f3846a022

        • C:\Users\Admin\AppData\Local\Commandership\ManyCam.exe

          Filesize

          1.7MB

          MD5

          ba699791249c311883baa8ce3432703b

          SHA1

          f8734601f9397cb5ebb8872af03f5b0639c2eac6

          SHA256

          7c4eb51a737a81c163f95b50ec54518b82fcf91389d0560e855f3e26cec07282

          SHA512

          6a0386424c61fbf525625ebe53bb2193accd51c2be9a2527fd567d0a6e112b0d1a047d8f7266d706b726e9c41ea77496e1ede186a5e59f5311eeea829a302325

        • C:\Users\Admin\AppData\Local\Commandership\cexwqap

          Filesize

          31KB

          MD5

          5d937ce5e1dbbeaa8ad3442db4e133e0

          SHA1

          59ac86c9554f4657e5743be621c87103e62ee663

          SHA256

          ac5d3dd071e8fbf2a6215b9d491c852e044a6673918466aebff7acc674818e41

          SHA512

          1af6587c97fe402606d19724c614155f034691169b810068e8d0eb12a9a1c8951bd340f0e294ad217295fe0ca4469e1a048c13f01af6d8c805c245e1307c77e8

        • C:\Users\Admin\AppData\Local\Commandership\cv099.dll

          Filesize

          664KB

          MD5

          2a8b33fee2f84490d52a3a7c75254971

          SHA1

          16ce2b1632a17949b92ce32a6211296fee431dca

          SHA256

          faff6a0745e1720413a028f77583fff013c3f4682756dc717a0549f1be3fefc2

          SHA512

          8daf104582547d6b3a6d8698836e279d88ad9a870e9fdd66c319ecada3757a3997f411976461ed30a5d24436baa7504355b49d4acec2f7cdfe10e1e392e0f7fb

        • C:\Users\Admin\AppData\Local\Commandership\cximagecrt.dll

          Filesize

          487KB

          MD5

          c36f6e088c6457a43adb7edcd17803f3

          SHA1

          b25b9fb4c10b8421c8762c7e7b3747113d5702de

          SHA256

          8e1243454a29998cc7dc89caecfadc0d29e00e5776a8b5777633238b8cd66f72

          SHA512

          87cad4c3059bd7de02338922cf14e515af5cad663d473b19dd66a4c8befc8bce61c9c2b5a14671bc71951fdff345e4ca7a799250d622e2c9236ec03d74d4fe4e

        • C:\Users\Admin\AppData\Local\Commandership\dbghelp.dll

          Filesize

          478KB

          MD5

          e458d88c71990f545ef941cd16080bad

          SHA1

          cd24ccec2493b64904cf3c139cd8d58d28d5993b

          SHA256

          5ec121730240548a85b7ef1f7e30d5fdbee153bb20dd92c2d44bf37395294ec0

          SHA512

          b1755e3db10b1d12d6eaffd1d91f5ca5e0f9f8ae1350675bc44ae7a4af4a48090a9828a8acbbc69c5813eac23e02576478113821cb2e04b6288e422f923b446f

        • C:\Users\Admin\AppData\Local\Commandership\mutdi

          Filesize

          1.1MB

          MD5

          9eeaf634e41a42729f4afa7f3637fbf4

          SHA1

          323845cece34759031555902047c8826cbb68150

          SHA256

          f3668524182ad304fffe298dabeec28a8db3497c8e42b9fbdc02ee01efef6de2

          SHA512

          59f5b233230d7e1bab143503194e6ed30d41506e74ca28c079a83004fb14cce41e2403aa3fccc723c8fa55bf7d3226f50f560fa0348006ff699ff282a5509613

        • C:\Users\Admin\AppData\Local\Temp\5af99d60

          Filesize

          1.6MB

          MD5

          4872e7e91613504c098e17f1f69ad429

          SHA1

          cd27ce6f909946215f613596a0c449a7165ce10f

          SHA256

          676a6656d455805fc3b2c15a407c03609042c6aa9773fea21331a6e65eba3ea8

          SHA512

          b6736ed3295cc4d4c87cdd69af14d34c674a1f1060e7ae6d2735f8b94a02da10f301fbe29fc01e30a6d54045e0a0ea612f298dd20106b45724f2159948eb3173

        • C:\Users\Admin\AppData\Local\Temp\Krycontrol_v5.exe

          Filesize

          433KB

          MD5

          fea067901f48a5f1faf7ca3b373f1a8f

          SHA1

          e8abe0deb87de9fe3bb3a611234584e9a9b17cce

          SHA256

          bf24b2f3e3a3c60ed116791b99e5421a4de34ac9c6e2201d34ab487e448ce152

          SHA512

          07c83a2d3d5dd475bc8aa48eba9b03e8fb742dbbd7bd623ed05dc1086efed7dfd1c1b8f037ee2e81efba1de58ea3243d7c84ac8b484e808cd28765f9c7517023

        • C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\CrashRpt.dll

          Filesize

          114KB

          MD5

          08dc2d56d688c17940179245cc47bbe4

          SHA1

          ec80b5b8c48e6cf5397f3244da16aea9578dcf20

          SHA256

          31a7fe8e8ee538a7089577037467ac7ba17b7b3ed9f052fc2e335ca721c43b55

          SHA512

          8b0f228e7abeb7ca41a3f6a9bcb1c14ed212946f204f5b9d60a3283d8df1105afbd850542313e3560be199e717a897a56628acbb99257673b946e30e05a292b9

        • C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\cxcore099.dll

          Filesize

          908KB

          MD5

          286284d4ae1c67d0d5666b1417dcd575

          SHA1

          8b8a32577051823b003c78c86054874491e9ecfa

          SHA256

          37d9a8057d58b043ad037e9905797c215cd0832d48a29731c1687b23447ce298

          SHA512

          2efc47a8e104baa13e19bee3b3b3364da09cea80601bc87492de348f1c8d61008002540ba8f0df99b2d20e333d09ea8e097a87c97e91910d7d592d11a953917a

        • C:\Users\Admin\AppData\Roaming\Uninstalloracle_Ki\highgui099.dll

          Filesize

          388KB

          MD5

          a354c42fcb37a50ecad8dde250f6119e

          SHA1

          0eb4ad5e90d28a4a8553d82cec53072279af1961

          SHA256

          89db6973f4ec5859792bcd8a50cd10db6b847613f2cea5adef740eec141673b2

          SHA512

          981c82f6334961c54c80009b14a0c2cd48067baf6d502560d508be86f5185374a422609c7fdc9a2cde9b98a7061efab7fd9b1f4f421436a9112833122bc35059

        • C:\Windows\Installer\e57bebc.msi

          Filesize

          2.8MB

          MD5

          86e199f73f01385585066e288c1738f3

          SHA1

          c7aaa0ed3d4177a71469667f617602b9517f2a48

          SHA256

          bcbcecf559e1506a12291cf270d6255f392a513ebca9464393d0a90efbaf9e63

          SHA512

          3d2a11d4093a90f5437e6c93c86473c6d773942aac9b66424d0e31d28c3016aa41b654742a5a98ec1aa9634e5a84f95498fef520c75a55dfbae022ad844f1756

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.9MB

          MD5

          73377ac1aa35d5885f4aa2369b8d375f

          SHA1

          f86c7cd4e8c45ed270a13ef35b8db83fdb73eeb2

          SHA256

          77090e5c2f41b13b793be88ed5299483d09b438a19b16947a56e69c838539710

          SHA512

          546f99491167263c6f5ee18be3ba35eeb0052f83a8f678a67327b08a4590c65b22cbd74de8011bd42e4665969442016c01bd163ecc946d3e6590d1ed0f9bd937

        • \??\Volume{1cd1de57-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c8d69cd1-681b-498c-9fe5-a40734c9833c}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          eb49d06e94b1943f8960e0dc516b35e9

          SHA1

          84e3cffcbf9038421f0d9cf8614ff781da6975c1

          SHA256

          2e873b00ec44173208a37ce70222ee2983add1ac11aa58b7d9cacaf35942bdd5

          SHA512

          3951cb57a0b708ec2cc96bdc2a898b436c016435c4f00334670b3f208d47473e155cd05c06cced40dfdfb78f0995baa52f48873e7c8aa2dfaa007dac43ed10bf

        • memory/1184-72-0x0000000001890000-0x00000000018F2000-memory.dmp

          Filesize

          392KB

        • memory/1184-69-0x00000000017E0000-0x000000000188D000-memory.dmp

          Filesize

          692KB

        • memory/1184-66-0x00000000016F0000-0x00000000017DC000-memory.dmp

          Filesize

          944KB

        • memory/1184-74-0x0000000074EE0000-0x000000007505B000-memory.dmp

          Filesize

          1.5MB

        • memory/1184-75-0x00007FFA104D0000-0x00007FFA106C8000-memory.dmp

          Filesize

          2.0MB

        • memory/1184-76-0x0000000074EE0000-0x000000007505B000-memory.dmp

          Filesize

          1.5MB

        • memory/2552-94-0x00007FFA104D0000-0x00007FFA106C8000-memory.dmp

          Filesize

          2.0MB

        • memory/2552-116-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-128-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-125-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-122-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-119-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-113-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-91-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-110-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-96-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-99-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-103-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/2552-107-0x0000000000F50000-0x0000000000FD3000-memory.dmp

          Filesize

          524KB

        • memory/3996-52-0x0000000001CB0000-0x0000000001D5D000-memory.dmp

          Filesize

          692KB

        • memory/3996-56-0x0000000074EE0000-0x000000007505B000-memory.dmp

          Filesize

          1.5MB

        • memory/3996-57-0x00007FFA104D0000-0x00007FFA106C8000-memory.dmp

          Filesize

          2.0MB

        • memory/3996-49-0x0000000001C40000-0x0000000001CA2000-memory.dmp

          Filesize

          392KB

        • memory/3996-46-0x0000000000B80000-0x0000000000BF8000-memory.dmp

          Filesize

          480KB

        • memory/5052-79-0x00007FFA104D0000-0x00007FFA106C8000-memory.dmp

          Filesize

          2.0MB

        • memory/5052-85-0x0000000074EE0000-0x000000007505B000-memory.dmp

          Filesize

          1.5MB

        • memory/5052-80-0x0000000074EE0000-0x000000007505B000-memory.dmp

          Filesize

          1.5MB