Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15 UTC

General

  • Target

    bd68ca7605316450c87b9218d2dbe19d8c5694e07b93f320f3ca4a9ad902c139.exe

  • Size

    1.7MB

  • MD5

    dffcd11d476c58ec3faa380cc679d6cd

  • SHA1

    809b2bdeb0485b409f0fef3cab124eec8331cc95

  • SHA256

    bd68ca7605316450c87b9218d2dbe19d8c5694e07b93f320f3ca4a9ad902c139

  • SHA512

    cf9219060cc1df30f0945fe77964855996d15a93efea373cbee03506335bad7bc02a0f12d82c630d0ec701089a6883bc0f63f9e396c7f53a27cfb5356a050bfd

  • SSDEEP

    24576:0D39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjoIK:0p7E+QrFUBgq2dK

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

213.183.58.19:4000

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    read.dat

  • keylog_flag

    false

  • keylog_folder

    CastC

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_sccafsoidz

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd68ca7605316450c87b9218d2dbe19d8c5694e07b93f320f3ca4a9ad902c139.exe
    "C:\Users\Admin\AppData\Local\Temp\bd68ca7605316450c87b9218d2dbe19d8c5694e07b93f320f3ca4a9ad902c139.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

  • flag-us
    DNS
    www.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    23.192.18.101
  • flag-gb
    GET
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    Remote address:
    23.192.18.101:80
    Request
    GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Mon, 03 Jun 2024 21:25:24 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: www.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 1078
    Content-Type: application/octet-stream
    Content-MD5: HqJzZuA065RHozzmOcAUiQ==
    Last-Modified: Tue, 14 Jan 2025 20:41:31 GMT
    ETag: 0x8DD34DBD43549F4
    x-ms-request-id: 90d94cda-601e-004e-55c9-667962000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Sat, 22 Mar 2025 06:22:44 GMT
    Connection: keep-alive
    TLS_version: UNKNOWN
    ms-cv: CASMicrosoftCV165793ff.0
    ms-cv-esi: CASMicrosoftCV165793ff.0
    X-RTag: RT
  • flag-us
    DNS
    crl.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    crl.microsoft.com
    IN A
    Response
    crl.microsoft.com
    IN CNAME
    crl.www.ms.akadns.net
    crl.www.ms.akadns.net
    IN CNAME
    a1363.dscg.akamai.net
    a1363.dscg.akamai.net
    IN A
    2.19.252.157
    a1363.dscg.akamai.net
    IN A
    2.19.252.143
  • flag-gb
    GET
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    Remote address:
    2.19.252.157:80
    Request
    GET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: crl.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 825
    Content-Type: application/octet-stream
    Content-MD5: O14L1mQEVqdJ2RVebBNXJw==
    Last-Modified: Wed, 26 Feb 2025 21:48:51 GMT
    ETag: 0x8DD56AF5BD2A499
    Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
    x-ms-request-id: 42091eff-701e-0052-4a9a-882b02000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Sat, 22 Mar 2025 06:22:44 GMT
    Connection: keep-alive
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 23.192.18.101:80
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    http
    393 B
    1.7kB
    4
    4

    HTTP Request

    GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

    HTTP Response

    200
  • 2.19.252.157:80
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    http
    457 B
    2.8kB
    5
    5

    HTTP Request

    GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

    HTTP Response

    200
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 213.183.58.19:4000
    sbietrcl.exe
    152 B
    3
  • 8.8.8.8:53
    www.microsoft.com
    dns
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    23.192.18.101

  • 8.8.8.8:53
    crl.microsoft.com
    dns
    63 B
    162 B
    1
    1

    DNS Request

    crl.microsoft.com

    DNS Response

    2.19.252.157
    2.19.252.143

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1494cbd7fb63b13be8187768a896a64c

    SHA1

    5d7996678cfbaae573a60b98e7acf44eb1149e4c

    SHA256

    820d984578f4ff37aad29e9f1ddcb71e657333cc129e2ba21c586ba7ce5b0c87

    SHA512

    d69b7b668e049d0384188e8a8c5ba115255af40ee5ccdddb3ede3c32b4ed16e7a3b0c4b0692ff9ef12632f2da3da9c8cfadd983ce7da2d088524c2f97f0a0826

  • C:\Users\Admin\AppData\Local\Temp\Cab2E60.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe

    Filesize

    1.7MB

    MD5

    3a62314d191188f661faba8a5c13054c

    SHA1

    512969817686043ae7a7027ac06df6bf3a5e83fc

    SHA256

    38308b1cd8813d353d06ed631fa585c8a88d33cafbf63523ad522fce1be5bae5

    SHA512

    f5bd2c133f367145084ba75387804c3f18f4c5b488e88112d4eebb3ab8dbf7ff2c8b9cac6cc15eee15459aa0c615c98a129db6086c6e361fb8b41f314a4b4bea

  • memory/2268-11-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-13-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-12-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-0-0x0000000074201000-0x0000000074202000-memory.dmp

    Filesize

    4KB

  • memory/2268-8-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-31-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2664-46-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-69-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-50-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-44-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-56-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2664-52-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-65-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-48-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-64-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-61-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-60-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2664-59-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2976-32-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-66-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-43-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-42-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-33-0x0000000074200000-0x00000000747AB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.