Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/09/2022, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1008KB
-
MD5
344a23d53906a0fe841f7a0a8126d75f
-
SHA1
278871bd3c21de399683e55bf8eec0317441a659
-
SHA256
1303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
-
SHA512
cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
SSDEEP
24576:E4444YyXDTaaHTDkr/LeBf6uG8yI0/dD+lPU3KqeMT/T7UCHdOWM4444:KKPezGb/jKqzf7r9O
Malware Config
Extracted
remcos
MalyMoney
maly22333.ddnsking.com:3091
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
iys.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-CQ4N0Z
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
gtr
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1860 iys.exe 1508 iys.exe 472 iys.exe 1576 iys.exe -
Loads dropped DLL 2 IoCs
pid Process 1760 cmd.exe 1760 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gtr = "\"C:\\Users\\Admin\\AppData\\Roaming\\iys.exe\"" tmp.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ iys.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\gtr = "\"C:\\Users\\Admin\\AppData\\Roaming\\iys.exe\"" iys.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1872 set thread context of 1500 1872 tmp.exe 28 PID 1860 set thread context of 1576 1860 iys.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1872 tmp.exe 1860 iys.exe 1860 iys.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1872 tmp.exe Token: SeDebugPrivilege 1860 iys.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 iys.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1532 1872 tmp.exe 27 PID 1872 wrote to memory of 1532 1872 tmp.exe 27 PID 1872 wrote to memory of 1532 1872 tmp.exe 27 PID 1872 wrote to memory of 1532 1872 tmp.exe 27 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1872 wrote to memory of 1500 1872 tmp.exe 28 PID 1500 wrote to memory of 320 1500 tmp.exe 29 PID 1500 wrote to memory of 320 1500 tmp.exe 29 PID 1500 wrote to memory of 320 1500 tmp.exe 29 PID 1500 wrote to memory of 320 1500 tmp.exe 29 PID 320 wrote to memory of 1760 320 WScript.exe 30 PID 320 wrote to memory of 1760 320 WScript.exe 30 PID 320 wrote to memory of 1760 320 WScript.exe 30 PID 320 wrote to memory of 1760 320 WScript.exe 30 PID 1760 wrote to memory of 1860 1760 cmd.exe 32 PID 1760 wrote to memory of 1860 1760 cmd.exe 32 PID 1760 wrote to memory of 1860 1760 cmd.exe 32 PID 1760 wrote to memory of 1860 1760 cmd.exe 32 PID 1860 wrote to memory of 1508 1860 iys.exe 33 PID 1860 wrote to memory of 1508 1860 iys.exe 33 PID 1860 wrote to memory of 1508 1860 iys.exe 33 PID 1860 wrote to memory of 1508 1860 iys.exe 33 PID 1860 wrote to memory of 472 1860 iys.exe 34 PID 1860 wrote to memory of 472 1860 iys.exe 34 PID 1860 wrote to memory of 472 1860 iys.exe 34 PID 1860 wrote to memory of 472 1860 iys.exe 34 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35 PID 1860 wrote to memory of 1576 1860 iys.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\iys.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Roaming\iys.exeC:\Users\Admin\AppData\Roaming\iys.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\iys.exe"C:\Users\Admin\AppData\Roaming\iys.exe"6⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\iys.exe"C:\Users\Admin\AppData\Roaming\iys.exe"6⤵
- Executes dropped EXE
PID:472
-
-
C:\Users\Admin\AppData\Roaming\iys.exe"C:\Users\Admin\AppData\Roaming\iys.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5d1d78c43dd8979c231896f298ba28326
SHA1f62fee4bb9bed07d062dd9f9618434d4417fa11d
SHA2565a8ddad5dcf6071f62ad721ac553bafd90be9db146aa77d29bfc30a72415099b
SHA5128a8baf664b75f7beb00abd3fc16286155850abfaa9d5d95687279244f0f5a3ceeef965e754de19614f7a18646ffea4c7b09d028e54fec2aaf42d896b2d93da6a
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce
-
Filesize
1008KB
MD5344a23d53906a0fe841f7a0a8126d75f
SHA1278871bd3c21de399683e55bf8eec0317441a659
SHA2561303812928a7f3ca5452a5d0758c2bbe3e876c892cbd90a6b6ca436f48e6940f
SHA512cd5ed8ed25f84e70483a5e9febce10f6109287ccba72833ad218c219ee074d3b069c7e29a52bd4940458837673134852bb8976621125b4ed9b4e8cbf54ac77ce