Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
FG98765678000.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FG98765678000.exe
Resource
win10v2004-20231215-en
General
-
Target
FG98765678000.exe
-
Size
656KB
-
MD5
0058da743288cb67e15afbfcb0ab6e1a
-
SHA1
99cde8486c006b735d1d5111d493303291a847fb
-
SHA256
412c4f354965eb514a79001b512c70e8d36e1d443fe599aca0916893eab369ef
-
SHA512
b0cb8a7279ad0e8e49b8b84738e009e93cc2e1e02a909ac88d929a374ff1e6aaa470c5226fcfe24969b4993a7d989a36432d948e1516635e32a1a79d1c06a966
-
SSDEEP
12288:RaoPTJIU4nr5Kfe8tNCqrKgj65I9ra/Q/fGHAW3A79hRff/aY:RDPFv4nVB8tNCqmgj6Ua/Q/fL97f6Y
Malware Config
Extracted
remcos
DOLLAR
107.175.229.139:8087
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-UZXQ9B
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1556-58-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral1/memory/1556-79-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/3040-51-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/3040-68-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral1/memory/3040-51-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/624-62-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/624-63-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1556-58-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral1/memory/3040-68-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/1556-79-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 2944 deaegyz.exe 2844 deaegyz.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 FG98765678000.exe 2944 deaegyz.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\ttdyhqmvrbkg = "C:\\Users\\Admin\\AppData\\Roaming\\yudmiibbwgcluq\\jjfo.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\deaegyz.exe\" " deaegyz.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2944 set thread context of 2844 2944 deaegyz.exe 30 PID 2844 set thread context of 2808 2844 deaegyz.exe 32 PID 2808 set thread context of 2804 2808 iexplore.exe 35 PID 2804 set thread context of 3040 2804 iexplore.exe 37 PID 2804 set thread context of 1556 2804 iexplore.exe 38 PID 2804 set thread context of 624 2804 iexplore.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 2944 deaegyz.exe 2844 deaegyz.exe 2844 deaegyz.exe 2844 deaegyz.exe 2808 iexplore.exe 2804 iexplore.exe 2804 iexplore.exe 2804 iexplore.exe 2804 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2944 3024 FG98765678000.exe 28 PID 3024 wrote to memory of 2944 3024 FG98765678000.exe 28 PID 3024 wrote to memory of 2944 3024 FG98765678000.exe 28 PID 3024 wrote to memory of 2944 3024 FG98765678000.exe 28 PID 2944 wrote to memory of 2844 2944 deaegyz.exe 30 PID 2944 wrote to memory of 2844 2944 deaegyz.exe 30 PID 2944 wrote to memory of 2844 2944 deaegyz.exe 30 PID 2944 wrote to memory of 2844 2944 deaegyz.exe 30 PID 2944 wrote to memory of 2844 2944 deaegyz.exe 30 PID 2844 wrote to memory of 2688 2844 deaegyz.exe 34 PID 2844 wrote to memory of 2688 2844 deaegyz.exe 34 PID 2844 wrote to memory of 2688 2844 deaegyz.exe 34 PID 2844 wrote to memory of 2688 2844 deaegyz.exe 34 PID 2844 wrote to memory of 2960 2844 deaegyz.exe 33 PID 2844 wrote to memory of 2960 2844 deaegyz.exe 33 PID 2844 wrote to memory of 2960 2844 deaegyz.exe 33 PID 2844 wrote to memory of 2960 2844 deaegyz.exe 33 PID 2844 wrote to memory of 2808 2844 deaegyz.exe 32 PID 2844 wrote to memory of 2808 2844 deaegyz.exe 32 PID 2844 wrote to memory of 2808 2844 deaegyz.exe 32 PID 2844 wrote to memory of 2808 2844 deaegyz.exe 32 PID 2844 wrote to memory of 2808 2844 deaegyz.exe 32 PID 2808 wrote to memory of 2804 2808 iexplore.exe 35 PID 2808 wrote to memory of 2804 2808 iexplore.exe 35 PID 2808 wrote to memory of 2804 2808 iexplore.exe 35 PID 2808 wrote to memory of 2804 2808 iexplore.exe 35 PID 2808 wrote to memory of 2804 2808 iexplore.exe 35 PID 2804 wrote to memory of 2732 2804 iexplore.exe 36 PID 2804 wrote to memory of 2732 2804 iexplore.exe 36 PID 2804 wrote to memory of 2732 2804 iexplore.exe 36 PID 2804 wrote to memory of 2732 2804 iexplore.exe 36 PID 2804 wrote to memory of 3040 2804 iexplore.exe 37 PID 2804 wrote to memory of 3040 2804 iexplore.exe 37 PID 2804 wrote to memory of 3040 2804 iexplore.exe 37 PID 2804 wrote to memory of 3040 2804 iexplore.exe 37 PID 2804 wrote to memory of 3040 2804 iexplore.exe 37 PID 2804 wrote to memory of 1556 2804 iexplore.exe 38 PID 2804 wrote to memory of 1556 2804 iexplore.exe 38 PID 2804 wrote to memory of 1556 2804 iexplore.exe 38 PID 2804 wrote to memory of 1556 2804 iexplore.exe 38 PID 2804 wrote to memory of 1556 2804 iexplore.exe 38 PID 2804 wrote to memory of 624 2804 iexplore.exe 39 PID 2804 wrote to memory of 624 2804 iexplore.exe 39 PID 2804 wrote to memory of 624 2804 iexplore.exe 39 PID 2804 wrote to memory of 624 2804 iexplore.exe 39 PID 2804 wrote to memory of 624 2804 iexplore.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\FG98765678000.exe"C:\Users\Admin\AppData\Local\Temp\FG98765678000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\deaegyz.exe"C:\Users\Admin\AppData\Local\Temp\deaegyz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\deaegyz.exe"C:\Users\Admin\AppData\Local\Temp\deaegyz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\csoc"6⤵PID:2732
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\csoc"6⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\eutnysr"6⤵
- Accesses Microsoft Outlook accounts
PID:1556
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\poyfqlbnchh"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"4⤵PID:2960
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"4⤵PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b3a3f9f09296f9c53276e66bce299863
SHA14dcd6412b0b7f0fc1ecad646f99e7ff1eee787d5
SHA256e21869047344363fa749a7d6535ded5dab4f0364742b06f4eb1935c4329c3662
SHA5122e0df9e5367679b89651628615fd0e5fcb0c4d1f45c231cf98ed96a42195bd74614cdb46fb7b8f2b698bf9c6f2a3dd1fa479b5bf2088f3c48bc9703e953e2d3d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
318KB
MD55affcfc88c7030e66a03274ac1749f2f
SHA19f69efe64f2c636c6465a0445720f1c00fa1dcf3
SHA2560ec70ffc61c48889baf9b02e9a966e601a9aa0cf7bd5809f2c0c23ff8a461901
SHA5122abdd83f3c9a90019e92119ac2484ee592a9d8d0f58161fc4ae60fbec3d6425a2e5131f03694d3582faacf6c5b6f51060492ccc9959cddb63cb53171162d43c9
-
Filesize
187KB
MD59e0bfe7028a56e45de99caa4c1095a32
SHA1b9df6618ed87fefbbd3359855cefc9e8a98ba4c6
SHA2561b5e56b73b05a90eca78b564b333a27c17aa6de09d93e1d8e9d622be29f9c778
SHA512f7694ed85d0f7cdcf7655a5dd641d6d06836a12beff1a8441e425e9cc56f0e772fdfeeaeeb1c13f18a0f7edccc2c1be0561c6997202bbceb5fddc2a2b59322f2
-
Filesize
355KB
MD5a97e8219b3776a69b532c5e70413d3f9
SHA1daf7368c6f434228cfacb2dd8fd0c6eed2f8fef9
SHA256c091c92769ddedd2fdc2b2e55104f45d650331d78b1e05f02bf185f17aa1a543
SHA5124f01370f7c5235ac0f054913bdbb417edaf876476a869af96298161a3a22760d2d06246fa4ef15fcda37eaa00f71061b3c84269c2c932cd24f3e3cb83178cba7
-
Filesize
306KB
MD511e2f7ba2c2a8aee31d0ab8c25ec4998
SHA1df736baf7d0e00c0739d8175c39b59b08c77f5b8
SHA256cd5ce80970b47e47863c06d6631fc0ea61b809c159ebcdf15698b4a96dc65b3a
SHA5126641c59d805477eb1f96c33a5e9133a2c8e73fe2d5d731cb230ddc4b14a08b04bfc061c331a8b7d8f42226b383ab37b2e4287e5b26e04f50c0f38a7ccdc1084f
-
Filesize
304KB
MD52f6a939478019a697747d5c9f3c4fb92
SHA1c833cde81515e1f59acd1134d26774a23bcd0ec2
SHA256cc48784b86fcaecd2921851e834dabd094c58469a71f43311d17d15016a23e48
SHA51218c4c72792f750e5b6936c36038f428b27490bc5cc919cc40cc9ac3f7c3ef7bbd9c3e8bbba7d6cd79b3b86538488d6c8a7da273f6a99a9209c32e68315a219db
-
Filesize
223KB
MD54e46383adf2d359800bffddf5873c349
SHA11b091890a795326b155bef4349ca53eaf6ad35fc
SHA2568483b46b397371beaf1e522f41ba938b0c99f2e9fe41015416bd07e155e2e2c7
SHA512cc562345fb9c01836e78b54fa1f22cf2b8f7ec0d55beae358d0a3f4fc35ce1bafce90b989a33929cc4a45eb571f00588ecabe84b33a9d5f5c4372b59624b904a