Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
GUHUDES23ED.exe
Resource
win7-20230831-en
General
-
Target
GUHUDES23ED.exe
-
Size
1.4MB
-
MD5
2279756982754f30b1c3a047acb5fb3c
-
SHA1
da6889d365c47ac46a16f1b3409d04c5778e4d50
-
SHA256
9a00523dfd6d321adb4fffbb54a1550055dde6301dddba3a5157a4169b11d462
-
SHA512
9d741a15ba84d386e641854a2ddeb934424c64d2543e2ec34cf5f9d042932e2a075daf109c540310e0c887e0e32825ae8d9967bb32bd7b23c869123f08bf18d8
-
SSDEEP
24576:VwOx9JKFIb6bQFf4SVuoOlwFjF0VbJszH2bF:zk90FQTlfJsz2
Malware Config
Extracted
remcos
HOSYT
194.147.140.246:1998
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-QOYAK6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2352 2204 GUHUDES23ED.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2204 GUHUDES23ED.exe 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2204 GUHUDES23ED.exe Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 GUHUDES23ED.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2612 2204 GUHUDES23ED.exe 30 PID 2204 wrote to memory of 2612 2204 GUHUDES23ED.exe 30 PID 2204 wrote to memory of 2612 2204 GUHUDES23ED.exe 30 PID 2204 wrote to memory of 2612 2204 GUHUDES23ED.exe 30 PID 2204 wrote to memory of 2636 2204 GUHUDES23ED.exe 32 PID 2204 wrote to memory of 2636 2204 GUHUDES23ED.exe 32 PID 2204 wrote to memory of 2636 2204 GUHUDES23ED.exe 32 PID 2204 wrote to memory of 2636 2204 GUHUDES23ED.exe 32 PID 2204 wrote to memory of 2524 2204 GUHUDES23ED.exe 34 PID 2204 wrote to memory of 2524 2204 GUHUDES23ED.exe 34 PID 2204 wrote to memory of 2524 2204 GUHUDES23ED.exe 34 PID 2204 wrote to memory of 2524 2204 GUHUDES23ED.exe 34 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35 PID 2204 wrote to memory of 2352 2204 GUHUDES23ED.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gmhPbe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gmhPbe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp690F.tmp"2⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"2⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"C:\Users\Admin\AppData\Local\Temp\GUHUDES23ED.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD544563327749dd9ae0a42d87f75f4ce4c
SHA1324ae12c38df11c1fcfe8462569ac50d8778679d
SHA2561208fa7842ae77fd0a325de63ed13b6291700c62a3677e0b06cef28e2c766f35
SHA51252c39e243534084223a15e91716d76e1e6ddbbbf18fd4396a8aba2673fe2061f00d1aad68258dfcabdc6b2df841152ee204b89ce4eacf9c9a8ce2fa59177844f
-
Filesize
1KB
MD5b4be3b9d62ce8d03b8146737db53ad33
SHA17c709a4aa0909b1b6a92d1d0d2eceeae786331fd
SHA256030b3396aa6001e73bf5416aefd7678d2be3b66c7581bf26e10f59ada49f4a6b
SHA51265b7328307907b81aa66ec1a8f7645c8c7020c84893a06a7d125be48f58de351ef94f6b658084347e7459ed55955a49b84053959a811ee692c473018f29417a4