Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6184ff3443ec7a285593273a59becfc0.exe
Resource
win7-20231023-en
General
-
Target
NEAS.6184ff3443ec7a285593273a59becfc0.exe
-
Size
1.2MB
-
MD5
6184ff3443ec7a285593273a59becfc0
-
SHA1
d66612979540afa05e77efc6b8ed527646da0bf8
-
SHA256
7fdaa2d9014b7ec1f7c9b851651909d1b4a137276376e1436c359ce435c18db2
-
SHA512
fcd24e33e79717502155363617ae082845951e165b0f1d96322d261606af84013d95b674133c11c597f66a8a4154dd5561ada33fd7c92091ae9e9fa85ade5315
-
SSDEEP
24576:1zcVdHBFT7bZsai6apMRE+2tA5JiQbSavT7BXZ7:1zcVrFPbZsaOMRUtALiaSavT1XZ7
Malware Config
Extracted
remcos
kill
tincaanii.duckdns.org:24113
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-KCRM7J
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 2616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe Token: SeDebugPrivilege 2616 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 NEAS.6184ff3443ec7a285593273a59becfc0.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2616 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 30 PID 2040 wrote to memory of 2616 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 30 PID 2040 wrote to memory of 2616 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 30 PID 2040 wrote to memory of 2616 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 30 PID 2040 wrote to memory of 2816 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 32 PID 2040 wrote to memory of 2816 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 32 PID 2040 wrote to memory of 2816 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 32 PID 2040 wrote to memory of 2816 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 32 PID 2040 wrote to memory of 2176 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 34 PID 2040 wrote to memory of 2176 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 34 PID 2040 wrote to memory of 2176 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 34 PID 2040 wrote to memory of 2176 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 34 PID 2040 wrote to memory of 2628 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 35 PID 2040 wrote to memory of 2628 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 35 PID 2040 wrote to memory of 2628 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 35 PID 2040 wrote to memory of 2628 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 35 PID 2040 wrote to memory of 2632 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 36 PID 2040 wrote to memory of 2632 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 36 PID 2040 wrote to memory of 2632 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 36 PID 2040 wrote to memory of 2632 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 36 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37 PID 2040 wrote to memory of 2652 2040 NEAS.6184ff3443ec7a285593273a59becfc0.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UinnfI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UinnfI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE466.tmp"2⤵
- Creates scheduled task(s)
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"2⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"2⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"2⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6184ff3443ec7a285593273a59becfc0.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD580f8e029348e8546fb944bc7b3f49ef4
SHA1502aaa78d30f9038288985159a21b3bc7daac826
SHA2565cc235a7a416b8b5d0546ba8c8948d03a5c43b6856849066c571f7598d73e75f
SHA512238d734cbaaf1b8ab9c3c0c1cf501becc39e3171f359c2d8003896e846aa9ca364a63f1396ea91cdfd15b92cf7ce46f7f1289ab9572bca9f658c04f6de2404a7
-
Filesize
1KB
MD5c1a20f75d4c320ed2b97be7f659bbde9
SHA1499158af684cdbaf1bc8e58477c12490ea22b5db
SHA2568df79141a17d2b65d3b3735f32a7dba2df1b04abcbd7dd570209fdfd27ad91bc
SHA51232b8f77f09a9b2bb3e13a911ca56c022a3604edbabff195e10d1a9f45ce88e6e63fc8593b1ee7a671103962aa7899b9f3786a093de89a6d9fd23906c241ec78c