Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
AIF 500 unit Distribution 2018ECA - ProfoInve.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AIF 500 unit Distribution 2018ECA - ProfoInve.exe
Resource
win10v2004-20220812-en
General
-
Target
AIF 500 unit Distribution 2018ECA - ProfoInve.exe
-
Size
986KB
-
MD5
f72d0995ccf16a2481cb2966e3e05f19
-
SHA1
7b40fd28569cd4517c3a6bb91ce11a7e26cde71c
-
SHA256
c046fc938166fd34c8041ff7c93f98f0ac3f68486aa844178e720c14dbbde625
-
SHA512
cb3243354cd56725a498ec5b60b6737bc15c72ff4b8e24dae378d98636abc9c00b14ebffee1cbf079580d8b16df467e701ea6571089f10830b0833f163017c90
-
SSDEEP
12288:DR7Vgp6llBxZ/sAu0ximzRLQgR//Y0ceWaJKv6gQuF:DR79lP5HRLQgR/g0ceLcCgQg
Malware Config
Extracted
remcos
manup
91.193.75.188:60005
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Y6KFVO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4668 WindowsWorkflowselection.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsWorkflowselection = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsWorkflowselection\\WindowsWorkflowselection.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 2552 4668 WindowsWorkflowselection.exe 101 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 3396 PING.EXE 4840 PING.EXE 684 PING.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 4668 WindowsWorkflowselection.exe 4668 WindowsWorkflowselection.exe 4668 WindowsWorkflowselection.exe 4668 WindowsWorkflowselection.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe Token: SeDebugPrivilege 4668 WindowsWorkflowselection.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2552 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2248 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 83 PID 2828 wrote to memory of 2248 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 83 PID 2828 wrote to memory of 2248 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 83 PID 2248 wrote to memory of 4840 2248 cmd.exe 85 PID 2248 wrote to memory of 4840 2248 cmd.exe 85 PID 2248 wrote to memory of 4840 2248 cmd.exe 85 PID 2828 wrote to memory of 3628 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 88 PID 2828 wrote to memory of 3628 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 88 PID 2828 wrote to memory of 3628 2828 AIF 500 unit Distribution 2018ECA - ProfoInve.exe 88 PID 3628 wrote to memory of 684 3628 cmd.exe 90 PID 3628 wrote to memory of 684 3628 cmd.exe 90 PID 3628 wrote to memory of 684 3628 cmd.exe 90 PID 2248 wrote to memory of 3912 2248 cmd.exe 94 PID 2248 wrote to memory of 3912 2248 cmd.exe 94 PID 2248 wrote to memory of 3912 2248 cmd.exe 94 PID 3628 wrote to memory of 3396 3628 cmd.exe 97 PID 3628 wrote to memory of 3396 3628 cmd.exe 97 PID 3628 wrote to memory of 3396 3628 cmd.exe 97 PID 3628 wrote to memory of 4668 3628 cmd.exe 98 PID 3628 wrote to memory of 4668 3628 cmd.exe 98 PID 3628 wrote to memory of 4668 3628 cmd.exe 98 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2356 4668 WindowsWorkflowselection.exe 100 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101 PID 4668 wrote to memory of 2552 4668 WindowsWorkflowselection.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\AIF 500 unit Distribution 2018ECA - ProfoInve.exe"C:\Users\Admin\AppData\Local\Temp\AIF 500 unit Distribution 2018ECA - ProfoInve.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WindowsWorkflowselection" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:4840
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WindowsWorkflowselection" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe"3⤵
- Adds Run key to start application
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 10 > nul && copy "C:\Users\Admin\AppData\Local\Temp\AIF 500 unit Distribution 2018ECA - ProfoInve.exe" "C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe" && ping 127.0.0.1 -n 10 > nul && "C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 103⤵
- Runs ping.exe
PID:684
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 103⤵
- Runs ping.exe
PID:3396
-
-
C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe"C:\Users\Admin\AppData\Roaming\WindowsWorkflowselection\WindowsWorkflowselection.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:2356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
986KB
MD5f72d0995ccf16a2481cb2966e3e05f19
SHA17b40fd28569cd4517c3a6bb91ce11a7e26cde71c
SHA256c046fc938166fd34c8041ff7c93f98f0ac3f68486aa844178e720c14dbbde625
SHA512cb3243354cd56725a498ec5b60b6737bc15c72ff4b8e24dae378d98636abc9c00b14ebffee1cbf079580d8b16df467e701ea6571089f10830b0833f163017c90
-
Filesize
986KB
MD5f72d0995ccf16a2481cb2966e3e05f19
SHA17b40fd28569cd4517c3a6bb91ce11a7e26cde71c
SHA256c046fc938166fd34c8041ff7c93f98f0ac3f68486aa844178e720c14dbbde625
SHA512cb3243354cd56725a498ec5b60b6737bc15c72ff4b8e24dae378d98636abc9c00b14ebffee1cbf079580d8b16df467e701ea6571089f10830b0833f163017c90