Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09/07/2020, 13:44

General

  • Target

    SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe

  • Size

    546KB

  • MD5

    e7ec2585b8fd04839c9d29fbaf35b6fc

  • SHA1

    c0b524bf9180fc3dbae0e8c72b96fd8c0ddf6e02

  • SHA256

    8afd54f2ed0af6d9593b0985cec1604748ca753900859fe4ee225d21b574e55e

  • SHA512

    c2ece5ab56dd7637b794e49cd5c0df9413ebd64ec2edf3443184d55e2330ee4450eee23f6d7469196e11ea7b1a5401e8ce935529f1c0cce4483c405f74438259

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SendNotifyMessage 4 IoCs
  • Adds Run entry to policy start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • Suspicious use of FindShellTrayWindow
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetThreadContext
        PID:1532
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Adds Run entry to start application
      • Adds Run entry to policy start application
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      PID:1404
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1848

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1132-0-0x0000000010410000-0x000000001043D000-memory.dmp

      Filesize

      180KB

    • memory/1404-3-0x00000000009E0000-0x0000000000A02000-memory.dmp

      Filesize

      136KB

    • memory/1404-4-0x0000000003350000-0x0000000003410000-memory.dmp

      Filesize

      768KB

    • memory/1404-5-0x0000000003EB0000-0x0000000004018000-memory.dmp

      Filesize

      1.4MB

    • memory/1848-7-0x000000013F9F0000-0x000000013FA83000-memory.dmp

      Filesize

      588KB