Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
Agenzia_Entrate_Applicazione.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Agenzia_Entrate_Applicazione.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
log.dll
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
log.dll
Resource
win10v2004-20231020-en
General
-
Target
Agenzia_Entrate_Applicazione.exe
-
Size
485KB
-
MD5
6bf3b86782b7911b76029737162ae206
-
SHA1
1b8009865c79b5674734ba4ce9a6905bed78182e
-
SHA256
535f67c47f811aa5b421904959dd6931396a52cdbb9ddb69bface741356dbbef
-
SHA512
385291ef2ba36b39fd6c7c5af08ad9127d60685e28d69e55152341f522b79f2f4ca3c1aa9e13575dbce0699d976b34dbb5985d08495ca22dc20ed323b7d80ba1
-
SSDEEP
6144:+d9GVCixOlHU+A/d6tUHOApJBIojiXEL6NSzpYJ8cLmBTXR/TXRqY+xBBYZK:+rFlGIUdbBWEL6GpYJpqy3p
Malware Config
Extracted
remcos
RemoteHost
listpoints.online:6090
retghrtgwtrgtg.bounceme.net:3839
listpoints.click:7020
datastream.myvnc.com:5225
gservicese.com:2718
center.onthewifi.com:8118
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
explorer.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BXAQVH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2044 Agenzia_Entrate_Applicazione.exe 1728 cmd.exe 1728 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2044 Agenzia_Entrate_Applicazione.exe 1728 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 PID 2044 wrote to memory of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 PID 2044 wrote to memory of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 PID 2044 wrote to memory of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 PID 2044 wrote to memory of 1728 2044 Agenzia_Entrate_Applicazione.exe 28 PID 1728 wrote to memory of 600 1728 cmd.exe 30 PID 1728 wrote to memory of 600 1728 cmd.exe 30 PID 1728 wrote to memory of 600 1728 cmd.exe 30 PID 1728 wrote to memory of 600 1728 cmd.exe 30 PID 1728 wrote to memory of 600 1728 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Agenzia_Entrate_Applicazione.exe"C:\Users\Admin\AppData\Local\Temp\Agenzia_Entrate_Applicazione.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59c2bb62e63e9e0e1997e973e49d482b3
SHA1e94e65a5bf0a6aa9a653b33e7033180fbdc236ca
SHA256cb5a342e601a26c1181efe25e1373fffe3950a2665713af8d00f6409810364af
SHA512a02c9e7c6e8d31b94ac0c83a1728fba1421b165c75a179f6e7df032d42d99a8c4b3d599fea3ee129e024db1cc94d5bbe64ae4fa567b36a46692c84b65d1f6e21