Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/09/2022, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe
-
Size
883KB
-
MD5
d693283a2b6c3a4b36f503b741cef17a
-
SHA1
d38ba08bce1821bf81d76c1e5b7b769c6681f159
-
SHA256
be0c5e38edc7aba393016c5cdf21d7a93b2daf78395ced609104f7055fd5f162
-
SHA512
0db444e29a7c574a91e140c06d84a66aa84d3884d4d593b5de8be50ee84acc8209831569aaa636b80a003ef240b2954a3929297445e08f30ca7ca3f995de30d6
-
SSDEEP
12288:NJ1bM9KvvqzRDYCIbw4IK2HBNxIJqRMj4V9N8kgJFT1scYq6y7qPg:etsENO2Mj4Gk4FTOq6y7qPg
Malware Config
Extracted
remcos
RemoteHost
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-G7HDVY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1056 taxrecords.exe 1880 taxrecords.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2032 set thread context of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 1056 set thread context of 812 1056 taxrecords.exe 39 PID 1880 set thread context of 2016 1880 taxrecords.exe 48 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1316 schtasks.exe 2024 schtasks.exe 664 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe Token: SeDebugPrivilege 1056 taxrecords.exe Token: SeDebugPrivilege 1880 taxrecords.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 1680 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 27 PID 2032 wrote to memory of 2028 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 28 PID 2032 wrote to memory of 2028 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 28 PID 2032 wrote to memory of 2028 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 28 PID 2032 wrote to memory of 2028 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 28 PID 2032 wrote to memory of 1356 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 30 PID 2032 wrote to memory of 1356 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 30 PID 2032 wrote to memory of 1356 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 30 PID 2032 wrote to memory of 1356 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 30 PID 2032 wrote to memory of 112 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 32 PID 2032 wrote to memory of 112 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 32 PID 2032 wrote to memory of 112 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 32 PID 2032 wrote to memory of 112 2032 SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe 32 PID 1356 wrote to memory of 1316 1356 cmd.exe 34 PID 1356 wrote to memory of 1316 1356 cmd.exe 34 PID 1356 wrote to memory of 1316 1356 cmd.exe 34 PID 1356 wrote to memory of 1316 1356 cmd.exe 34 PID 1632 wrote to memory of 1056 1632 taskeng.exe 38 PID 1632 wrote to memory of 1056 1632 taskeng.exe 38 PID 1632 wrote to memory of 1056 1632 taskeng.exe 38 PID 1632 wrote to memory of 1056 1632 taskeng.exe 38 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 812 1056 taxrecords.exe 39 PID 1056 wrote to memory of 840 1056 taxrecords.exe 40 PID 1056 wrote to memory of 840 1056 taxrecords.exe 40 PID 1056 wrote to memory of 840 1056 taxrecords.exe 40 PID 1056 wrote to memory of 840 1056 taxrecords.exe 40 PID 1056 wrote to memory of 1184 1056 taxrecords.exe 41 PID 1056 wrote to memory of 1184 1056 taxrecords.exe 41 PID 1056 wrote to memory of 1184 1056 taxrecords.exe 41 PID 1056 wrote to memory of 1184 1056 taxrecords.exe 41 PID 1056 wrote to memory of 1640 1056 taxrecords.exe 44 PID 1056 wrote to memory of 1640 1056 taxrecords.exe 44 PID 1056 wrote to memory of 1640 1056 taxrecords.exe 44 PID 1056 wrote to memory of 1640 1056 taxrecords.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\taxrecords"2⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f3⤵
- Creates scheduled task(s)
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.22441.31968.10217.exe" "C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe"2⤵PID:112
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9406DAC1-8804-4CE2-8E5D-AF028E38BF7B} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exeC:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:812
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\taxrecords"3⤵PID:840
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f3⤵PID:1184
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f4⤵
- Creates scheduled task(s)
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe" "C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe"3⤵PID:1640
-
-
-
C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exeC:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2016
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\taxrecords"3⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f3⤵PID:1740
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe'" /f4⤵
- Creates scheduled task(s)
PID:664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe" "C:\Users\Admin\AppData\Roaming\taxrecords\taxrecords.exe"3⤵PID:1912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883KB
MD5d693283a2b6c3a4b36f503b741cef17a
SHA1d38ba08bce1821bf81d76c1e5b7b769c6681f159
SHA256be0c5e38edc7aba393016c5cdf21d7a93b2daf78395ced609104f7055fd5f162
SHA5120db444e29a7c574a91e140c06d84a66aa84d3884d4d593b5de8be50ee84acc8209831569aaa636b80a003ef240b2954a3929297445e08f30ca7ca3f995de30d6
-
Filesize
883KB
MD5d693283a2b6c3a4b36f503b741cef17a
SHA1d38ba08bce1821bf81d76c1e5b7b769c6681f159
SHA256be0c5e38edc7aba393016c5cdf21d7a93b2daf78395ced609104f7055fd5f162
SHA5120db444e29a7c574a91e140c06d84a66aa84d3884d4d593b5de8be50ee84acc8209831569aaa636b80a003ef240b2954a3929297445e08f30ca7ca3f995de30d6
-
Filesize
883KB
MD5d693283a2b6c3a4b36f503b741cef17a
SHA1d38ba08bce1821bf81d76c1e5b7b769c6681f159
SHA256be0c5e38edc7aba393016c5cdf21d7a93b2daf78395ced609104f7055fd5f162
SHA5120db444e29a7c574a91e140c06d84a66aa84d3884d4d593b5de8be50ee84acc8209831569aaa636b80a003ef240b2954a3929297445e08f30ca7ca3f995de30d6