Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
Agenzia_Entrate_Applicazione.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Agenzia_Entrate_Applicazione.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
log.dll
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
log.dll
Resource
win10v2004-20231020-en
General
-
Target
Agenzia_Entrate_Applicazione.exe
-
Size
485KB
-
MD5
6bf3b86782b7911b76029737162ae206
-
SHA1
1b8009865c79b5674734ba4ce9a6905bed78182e
-
SHA256
535f67c47f811aa5b421904959dd6931396a52cdbb9ddb69bface741356dbbef
-
SHA512
385291ef2ba36b39fd6c7c5af08ad9127d60685e28d69e55152341f522b79f2f4ca3c1aa9e13575dbce0699d976b34dbb5985d08495ca22dc20ed323b7d80ba1
-
SSDEEP
6144:+d9GVCixOlHU+A/d6tUHOApJBIojiXEL6NSzpYJ8cLmBTXR/TXRqY+xBBYZK:+rFlGIUdbBWEL6GpYJpqy3p
Malware Config
Extracted
remcos
RemoteHost
listpoints.online:6090
retghrtgwtrgtg.bounceme.net:3839
listpoints.click:7020
datastream.myvnc.com:5225
gservicese.com:2718
center.onthewifi.com:8118
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
explorer.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BXAQVH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3652 set thread context of 888 3652 Agenzia_Entrate_Applicazione.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3652 Agenzia_Entrate_Applicazione.exe 888 cmd.exe 888 cmd.exe 888 cmd.exe 888 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3652 Agenzia_Entrate_Applicazione.exe 888 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1568 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3652 wrote to memory of 888 3652 Agenzia_Entrate_Applicazione.exe 86 PID 3652 wrote to memory of 888 3652 Agenzia_Entrate_Applicazione.exe 86 PID 3652 wrote to memory of 888 3652 Agenzia_Entrate_Applicazione.exe 86 PID 3652 wrote to memory of 888 3652 Agenzia_Entrate_Applicazione.exe 86 PID 888 wrote to memory of 5092 888 cmd.exe 101 PID 888 wrote to memory of 5092 888 cmd.exe 101 PID 888 wrote to memory of 5092 888 cmd.exe 101 PID 888 wrote to memory of 5092 888 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Agenzia_Entrate_Applicazione.exe"C:\Users\Admin\AppData\Local\Temp\Agenzia_Entrate_Applicazione.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:5092
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD522df24448964b6a2a0b3c7cb940d126a
SHA16e25f0928b204a342b9bf347982601ffa9e90110
SHA2561eb23e13394a1ac4cb9b4cc5c8417841f7eabfb85214ecfab11d5c8c32f84849
SHA512231b34e5a5198dfe0751b924770c7ba38c802b535c70f2f2be759579c3f0c2180544c3d21b8f2da5c7ea6e839180cfb7437f295eab959e719594fcfbb1e0d442