Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
solicitud de presupuesto 29-11-2022.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
solicitud de presupuesto 29-11-2022.exe
Resource
win10v2004-20220812-en
General
-
Target
solicitud de presupuesto 29-11-2022.exe
-
Size
125KB
-
MD5
3cd5112e9d9cd2bc8ed794401cc271e9
-
SHA1
4ab5de3c9df69b32bdb2c7b39fa36ab5f14ec97a
-
SHA256
a97f182e8e7da0854b932b946352626e4c94c6f1319ea6ddf5cefa854af93bd7
-
SHA512
d36d489dd4ad11c4be771baecdd641108e5384c140e4236bb696b66abb3dcb744e1c165bebad2c8d218cce2125fbba957054bd12318f34bb872c154df2d9c421
-
SSDEEP
1536:FXVlyB2mzz5plxj6gpf6m4JE/9F6i8x6YEDHBDF1aOHCmvRwv+SfF1FVj:BVlyB2srxWxwF6iNDHzJwv+k1FVj
Malware Config
Extracted
remcos
RemoteHost
obologs.work.gd:4044
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-0IY2Q2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4832-161-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral2/memory/4832-163-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1020-162-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/1020-165-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/4280-160-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4832-161-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/1020-162-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4832-163-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4280-164-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1020-165-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation solicitud de presupuesto 29-11-2022.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts aspnet_compiler.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qjscytuqaqq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Swgosuuckn\\Qjscytuqaqq.exe\"" solicitud de presupuesto 29-11-2022.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1944 set thread context of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 4428 set thread context of 1020 4428 aspnet_compiler.exe 95 PID 4428 set thread context of 4832 4428 aspnet_compiler.exe 98 PID 4428 set thread context of 4280 4428 aspnet_compiler.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5048 powershell.exe 5048 powershell.exe 3116 powershell.exe 3116 powershell.exe 1020 aspnet_compiler.exe 1020 aspnet_compiler.exe 4280 aspnet_compiler.exe 4280 aspnet_compiler.exe 1020 aspnet_compiler.exe 1020 aspnet_compiler.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe 4428 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 1944 solicitud de presupuesto 29-11-2022.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 4280 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1944 wrote to memory of 5048 1944 solicitud de presupuesto 29-11-2022.exe 82 PID 1944 wrote to memory of 5048 1944 solicitud de presupuesto 29-11-2022.exe 82 PID 1944 wrote to memory of 5048 1944 solicitud de presupuesto 29-11-2022.exe 82 PID 1944 wrote to memory of 3116 1944 solicitud de presupuesto 29-11-2022.exe 85 PID 1944 wrote to memory of 3116 1944 solicitud de presupuesto 29-11-2022.exe 85 PID 1944 wrote to memory of 3116 1944 solicitud de presupuesto 29-11-2022.exe 85 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 1944 wrote to memory of 4428 1944 solicitud de presupuesto 29-11-2022.exe 93 PID 4428 wrote to memory of 1888 4428 aspnet_compiler.exe 94 PID 4428 wrote to memory of 1888 4428 aspnet_compiler.exe 94 PID 4428 wrote to memory of 1888 4428 aspnet_compiler.exe 94 PID 4428 wrote to memory of 1020 4428 aspnet_compiler.exe 95 PID 4428 wrote to memory of 1020 4428 aspnet_compiler.exe 95 PID 4428 wrote to memory of 1020 4428 aspnet_compiler.exe 95 PID 4428 wrote to memory of 1020 4428 aspnet_compiler.exe 95 PID 4428 wrote to memory of 2712 4428 aspnet_compiler.exe 96 PID 4428 wrote to memory of 2712 4428 aspnet_compiler.exe 96 PID 4428 wrote to memory of 2712 4428 aspnet_compiler.exe 96 PID 4428 wrote to memory of 732 4428 aspnet_compiler.exe 97 PID 4428 wrote to memory of 732 4428 aspnet_compiler.exe 97 PID 4428 wrote to memory of 732 4428 aspnet_compiler.exe 97 PID 4428 wrote to memory of 4832 4428 aspnet_compiler.exe 98 PID 4428 wrote to memory of 4832 4428 aspnet_compiler.exe 98 PID 4428 wrote to memory of 4832 4428 aspnet_compiler.exe 98 PID 4428 wrote to memory of 4832 4428 aspnet_compiler.exe 98 PID 4428 wrote to memory of 5000 4428 aspnet_compiler.exe 99 PID 4428 wrote to memory of 5000 4428 aspnet_compiler.exe 99 PID 4428 wrote to memory of 5000 4428 aspnet_compiler.exe 99 PID 4428 wrote to memory of 4280 4428 aspnet_compiler.exe 100 PID 4428 wrote to memory of 4280 4428 aspnet_compiler.exe 100 PID 4428 wrote to memory of 4280 4428 aspnet_compiler.exe 100 PID 4428 wrote to memory of 4280 4428 aspnet_compiler.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\solicitud de presupuesto 29-11-2022.exe"C:\Users\Admin\AppData\Local\Temp\solicitud de presupuesto 29-11-2022.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-Date2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\dlmuspc"3⤵PID:1888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\dlmuspc"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\ogrmthnvsw"3⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\ogrmthnvsw"3⤵PID:732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\ogrmthnvsw"3⤵
- Accesses Microsoft Outlook accounts
PID:4832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\yixxtayogedrf"3⤵PID:5000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /stext "C:\Users\Admin\AppData\Local\Temp\yixxtayogedrf"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
17KB
MD56ac839d7d02c0f88d82a69cf0cc8fa42
SHA148c201aad3fc3c9e90272c7c703b415e20971b0b
SHA256c4b108d8e7f015ad95f88d8ff58e699a6160e11548ad1a54ec5c92221ec0da07
SHA512c6efd4eaef035f5a607848aca0edf815821e0e36ce8c51958adc2c6335b3073bbefd7bc8b93e3e6d1c9fba0499d7f5e5f0cb7f39a5feb4d80f7b65a41480f237
-
Filesize
4KB
MD5d06ebab8b0513f602e535079a9ebbeea
SHA1d29472e6eb5a72f0353d70b97a33337b255b487e
SHA2560c9e16830ccc6495def187adde2137ac07a566e1534e5714f626dcd68d28094c
SHA512002df6f401950fd24d5976a47c58e9e2c58cef7d4fdec69f815fb6a00fb1e1a8963a4a7bf52056e61d6f6875edec393c466742c3031dd5f88802b45ddadca209