Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
RFQ ETMT 009462900_pdf(58kb).exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RFQ ETMT 009462900_pdf(58kb).exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
jjuhibpwa.ps1
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
jjuhibpwa.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
wnnqrg.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
wnnqrg.exe
Resource
win10v2004-20231222-en
General
-
Target
RFQ ETMT 009462900_pdf(58kb).exe
-
Size
499KB
-
MD5
8db92bb4d4f088c378b9c430b72ac827
-
SHA1
41cc52c3b467aac55ff57ad9d1fd7223fef7ee70
-
SHA256
2fb6f8d101edc0b6a053d332cb32d0134f5c66629970cf411f34f437928b87a4
-
SHA512
2fe47dd6cc30575f8ec65ee5287cc7e345888efba328fff73a339bbe7e748d588186763c5b3d69cd7ca3c2a40a047cac4d755591a29c690bbb01db71a97fbd09
-
SSDEEP
12288:YkSnWVfzb9ybh95rH9P2VtHO8LVS6krP6qwFkOfWeuteV8aV:YJnefzb0toVtHvA3vleK0
Malware Config
Extracted
remcos
FRESH
igw.myfirewall.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
outlook
-
mouse_option
false
-
mutex
RmcbWqr-YNNHMH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2352 wnnqrg.exe 2768 wnnqrg.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 RFQ ETMT 009462900_pdf(58kb).exe 2352 wnnqrg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\nnwsscxhhq = "C:\\Users\\Admin\\AppData\\Roaming\\irrbwwg\\plluqqyiie.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\wnnqrg.exe\" " wnnqrg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2768 2352 wnnqrg.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2352 wnnqrg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 wnnqrg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2352 2380 RFQ ETMT 009462900_pdf(58kb).exe 28 PID 2380 wrote to memory of 2352 2380 RFQ ETMT 009462900_pdf(58kb).exe 28 PID 2380 wrote to memory of 2352 2380 RFQ ETMT 009462900_pdf(58kb).exe 28 PID 2380 wrote to memory of 2352 2380 RFQ ETMT 009462900_pdf(58kb).exe 28 PID 2352 wrote to memory of 2768 2352 wnnqrg.exe 29 PID 2352 wrote to memory of 2768 2352 wnnqrg.exe 29 PID 2352 wrote to memory of 2768 2352 wnnqrg.exe 29 PID 2352 wrote to memory of 2768 2352 wnnqrg.exe 29 PID 2352 wrote to memory of 2768 2352 wnnqrg.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ ETMT 009462900_pdf(58kb).exe"C:\Users\Admin\AppData\Local\Temp\RFQ ETMT 009462900_pdf(58kb).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\wnnqrg.exe"C:\Users\Admin\AppData\Local\Temp\wnnqrg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\wnnqrg.exe"C:\Users\Admin\AppData\Local\Temp\wnnqrg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD55188d27ffff99bdc58485206495cccb5
SHA14f87781c32dbb6fc3905d77b583499d910a02413
SHA25649e24c7305913a2e9c00e2432e4926059195dd955a6719e7adc137f6d68c3b76
SHA512130457f539f831ba84d1de5c4a3de67c8e205045faa98cbc6485bb91e0d666abcab7bc3d88c9c2096d9908a18c80da752a5508123a9f7d52470e46f940a1f9ec
-
Filesize
319KB
MD5a7388208f7d6cba2b8e5464e593ac087
SHA18d7f91be4d0daba4e86fb45a99304466de4de9b5
SHA25694cf06f826a1c5d2b4dc14cecb1bd93595af8941c67320cebdbad037c93e0ce0
SHA512bc342b3256f9a6f64a43b448ee09753b59d9b34819aaa3d743f8f73860fb729f604a7da4a54dbf159875d03ad775c481a44e4af16ba75115735893524fe206bf
-
Filesize
62KB
MD5ad65f79ab6bd2884461a198e1d77ef76
SHA1f7ac4388da64c17f92f0c10803de57abad060bb9
SHA256c545d7f6a0c7da83bdabf56728c240bca8dc9f86416123efde1a3e60d87626ce
SHA5127da047e3ce0ffe6d01e603092f12acfa98499b0407ba6b328acd94eb7894f7009163804b6fd645ae6b6d0deb98091cacb71b53c0585381fdb962a205e6a8440e