Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
2606592152733152221441264660922248507516180361457925655560773.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2606592152733152221441264660922248507516180361457925655560773.exe
Resource
win10v2004-20231023-en
General
-
Target
2606592152733152221441264660922248507516180361457925655560773.exe
-
Size
633KB
-
MD5
b40522e839fb4f09709f9f31e56eecf6
-
SHA1
17d11d8e31d7d71cf61a418d5d229ecdcadfaec1
-
SHA256
ba765e695b9b4569789654836bfd121f24dbaf70d0f36ba77e8d4c72f314910d
-
SHA512
306c8d0a20feac90dc3cb0d9e1ae4d98f8820be9301bccc699ee226265e580eae720419844f37aa0bbda1487c7fcdef9e12f966d856a09ed1c74588de78bcd96
-
SSDEEP
12288:gUtIDPQAH17ZxUbUS8yFOHPpiu5rSyN/aJ52/5uuZZWWFcplkap:jIDPQAVdxIUNyFcxh/aJA/5ueZWWFUlZ
Malware Config
Extracted
remcos
VPS3
192.161.184.21:24053
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Rvp
-
mouse_option
false
-
mutex
VpSnEwxyz-DFPJ68
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dwnjqgup = "C:\\Users\\Admin\\AppData\\Roaming\\Dwnjqgup.exe" 2606592152733152221441264660922248507516180361457925655560773.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 2606592152733152221441264660922248507516180361457925655560773.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1860 2606592152733152221441264660922248507516180361457925655560773.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28 PID 1748 wrote to memory of 1860 1748 2606592152733152221441264660922248507516180361457925655560773.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2606592152733152221441264660922248507516180361457925655560773.exe"C:\Users\Admin\AppData\Local\Temp\2606592152733152221441264660922248507516180361457925655560773.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\2606592152733152221441264660922248507516180361457925655560773.exeC:\Users\Admin\AppData\Local\Temp\2606592152733152221441264660922248507516180361457925655560773.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD541915a2e937206df6481eed04055f0f8
SHA131ba3619b49dbd3a547fc5a442fa83adb0e1978f
SHA256d1e55caec2cfb04441acfb39ae7aca51bc97a593fdb03ccbb963f666a3de105c
SHA5126ffe75fd70eaf3ab825dfcfb9fd7c7397350e144af57a9cdb76f7f68d62cd8c63a00a7dae9ee5b129df25f83bf33beb681b3d9fb737b7f098a60df195d1db723