Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 07:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Item_list0025.exe
Resource
win7-20231215-en
General
-
Target
Item_list0025.exe
-
Size
862KB
-
MD5
8c0808705c8abff0a07a6ca91c6df24e
-
SHA1
28aaae99c9b7290252d7f4bb8fd7e50e9942345c
-
SHA256
8957582ccd1876780ff5a43336984ee23ff03be1c8184a6ff9797828f52536e1
-
SHA512
1ff6598349a3d82f7160dcf3dc7189a85872ce5b47ac8bacd74bbfc166668573b2b923fabf07059dbc0bc8b5cf956993355219bcae26169440c5c8283217deac
-
SSDEEP
24576:mJci+WaRI9bCsla3fAqdfXu5IIhxiwe7:KmI9afu+Iff
Malware Config
Extracted
remcos
dk
64.188.20.186:5050
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TPXVZV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/3036-61-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral1/memory/3036-75-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2956-53-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/2956-72-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral1/memory/2956-53-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/3036-61-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral1/memory/1972-66-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1972-67-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2956-72-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/3036-75-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Item_list0025.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 2936 2040 Item_list0025.exe 33 PID 2936 set thread context of 2956 2936 Item_list0025.exe 36 PID 2936 set thread context of 3036 2936 Item_list0025.exe 39 PID 2936 set thread context of 1972 2936 Item_list0025.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2040 Item_list0025.exe 2724 powershell.exe 2956 Item_list0025.exe 2956 Item_list0025.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2936 Item_list0025.exe 2936 Item_list0025.exe 2936 Item_list0025.exe 2936 Item_list0025.exe 2936 Item_list0025.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2040 Item_list0025.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 1972 Item_list0025.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2724 2040 Item_list0025.exe 28 PID 2040 wrote to memory of 2724 2040 Item_list0025.exe 28 PID 2040 wrote to memory of 2724 2040 Item_list0025.exe 28 PID 2040 wrote to memory of 2724 2040 Item_list0025.exe 28 PID 2040 wrote to memory of 2768 2040 Item_list0025.exe 30 PID 2040 wrote to memory of 2768 2040 Item_list0025.exe 30 PID 2040 wrote to memory of 2768 2040 Item_list0025.exe 30 PID 2040 wrote to memory of 2768 2040 Item_list0025.exe 30 PID 2040 wrote to memory of 2764 2040 Item_list0025.exe 32 PID 2040 wrote to memory of 2764 2040 Item_list0025.exe 32 PID 2040 wrote to memory of 2764 2040 Item_list0025.exe 32 PID 2040 wrote to memory of 2764 2040 Item_list0025.exe 32 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2040 wrote to memory of 2936 2040 Item_list0025.exe 33 PID 2936 wrote to memory of 2956 2936 Item_list0025.exe 36 PID 2936 wrote to memory of 2956 2936 Item_list0025.exe 36 PID 2936 wrote to memory of 2956 2936 Item_list0025.exe 36 PID 2936 wrote to memory of 2956 2936 Item_list0025.exe 36 PID 2936 wrote to memory of 2956 2936 Item_list0025.exe 36 PID 2936 wrote to memory of 2960 2936 Item_list0025.exe 37 PID 2936 wrote to memory of 2960 2936 Item_list0025.exe 37 PID 2936 wrote to memory of 2960 2936 Item_list0025.exe 37 PID 2936 wrote to memory of 2960 2936 Item_list0025.exe 37 PID 2936 wrote to memory of 2168 2936 Item_list0025.exe 38 PID 2936 wrote to memory of 2168 2936 Item_list0025.exe 38 PID 2936 wrote to memory of 2168 2936 Item_list0025.exe 38 PID 2936 wrote to memory of 2168 2936 Item_list0025.exe 38 PID 2936 wrote to memory of 3036 2936 Item_list0025.exe 39 PID 2936 wrote to memory of 3036 2936 Item_list0025.exe 39 PID 2936 wrote to memory of 3036 2936 Item_list0025.exe 39 PID 2936 wrote to memory of 3036 2936 Item_list0025.exe 39 PID 2936 wrote to memory of 3036 2936 Item_list0025.exe 39 PID 2936 wrote to memory of 1972 2936 Item_list0025.exe 40 PID 2936 wrote to memory of 1972 2936 Item_list0025.exe 40 PID 2936 wrote to memory of 1972 2936 Item_list0025.exe 40 PID 2936 wrote to memory of 1972 2936 Item_list0025.exe 40 PID 2936 wrote to memory of 1972 2936 Item_list0025.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hFjPDstJByxXbg.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hFjPDstJByxXbg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA44B.tmp"2⤵
- Creates scheduled task(s)
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"C:\Users\Admin\AppData\Local\Temp\Item_list0025.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exeC:\Users\Admin\AppData\Local\Temp\Item_list0025.exe /stext "C:\Users\Admin\AppData\Local\Temp\mgvlrtzqdg"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exeC:\Users\Admin\AppData\Local\Temp\Item_list0025.exe /stext "C:\Users\Admin\AppData\Local\Temp\pjjdsmjjromfz"3⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exeC:\Users\Admin\AppData\Local\Temp\Item_list0025.exe /stext "C:\Users\Admin\AppData\Local\Temp\pjjdsmjjromfz"3⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exeC:\Users\Admin\AppData\Local\Temp\Item_list0025.exe /stext "C:\Users\Admin\AppData\Local\Temp\pjjdsmjjromfz"3⤵
- Accesses Microsoft Outlook accounts
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Item_list0025.exeC:\Users\Admin\AppData\Local\Temp\Item_list0025.exe /stext "C:\Users\Admin\AppData\Local\Temp\zdowseulnwekbygps"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
Network
-
Remote address:8.8.8.8:53Requestgeoplugin.netIN AResponsegeoplugin.netIN A178.237.33.50
-
Remote address:178.237.33.50:80RequestGET /json.gp HTTP/1.1
Host: geoplugin.net
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
server: Apache
content-length: 953
content-type: application/json; charset=utf-8
cache-control: public, max-age=300
access-control-allow-origin: *
-
3.4kB 1.7kB 14 18
-
30.4kB 501.8kB 212 372
-
577 B 2.5kB 11 4
HTTP Request
GET http://geoplugin.net/json.gpHTTP Response
200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5cc0f01ba1d295e94297cc15ae19c307d
SHA170d424f7209c2120f27cbce982ff04caf84a43df
SHA256ad2489aace77e9b39f0b0b06bfa68de65596808b247b41a42abe5bac7980280a
SHA512b28a1377ea680053b571f8cbeadf4b8a3493553132a161fba166d71c6e6bb6752b89e116aaa2fa0fed1293ec024b3caf98c9bcbdf6ebd9dca001eb87f5d1085d