Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    09/07/2020, 13:44

General

  • Target

    SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe

  • Size

    546KB

  • MD5

    e7ec2585b8fd04839c9d29fbaf35b6fc

  • SHA1

    c0b524bf9180fc3dbae0e8c72b96fd8c0ddf6e02

  • SHA256

    8afd54f2ed0af6d9593b0985cec1604748ca753900859fe4ee225d21b574e55e

  • SHA512

    c2ece5ab56dd7637b794e49cd5c0df9413ebd64ec2edf3443184d55e2330ee4450eee23f6d7469196e11ea7b1a5401e8ce935529f1c0cce4483c405f74438259

Score
8/10

Malware Config

Signatures

  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run entry to policy start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.Backdoor.Remcos.948.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3684
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Adds Run entry to policy start application
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Adds Run entry to start application
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      PID:4044
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
          PID:3832
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:4036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1628-0-0x0000000010410000-0x000000001043D000-memory.dmp

        Filesize

        180KB

      • memory/4036-10-0x00007FF688500000-0x00007FF688593000-memory.dmp

        Filesize

        588KB

      • memory/4036-11-0x00007FF688500000-0x00007FF688593000-memory.dmp

        Filesize

        588KB

      • memory/4036-12-0x00007FF688500000-0x00007FF688593000-memory.dmp

        Filesize

        588KB

      • memory/4044-4-0x00000000010B0000-0x00000000010C3000-memory.dmp

        Filesize

        76KB

      • memory/4044-8-0x0000000005800000-0x000000000588E000-memory.dmp

        Filesize

        568KB

      • memory/4044-7-0x0000000005800000-0x0000000005897000-memory.dmp

        Filesize

        604KB

      • memory/4044-3-0x00000000010B0000-0x00000000010C3000-memory.dmp

        Filesize

        76KB