Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe
Resource
win10v2004-20240226-en
General
-
Target
Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe
-
Size
926KB
-
MD5
a5116c0a496d4b011dd2afc12147d1b2
-
SHA1
967e37264a5e0982b21b267211f9c5ccdc1662cf
-
SHA256
98b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b
-
SHA512
1d1922b3cbd0bc2e3e85ce0e787f63819a8f0a76286f58d590fecc3d5753cf78fe17ce3ecf8253117189a8f994e4b7b167aca394721bf3f1acd708f2702ffe87
-
SSDEEP
24576:8cKhi13lO4V99LzjUdKc7dJ3iPOgrNiFj2+:NKE1hLzjA7Z8Piz
Malware Config
Extracted
remcos
JONS
172.245.208.13:4445
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R7QS5C
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/852-68-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/852-83-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2744-63-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/2744-77-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral1/memory/2744-63-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/852-68-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1092-71-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1092-72-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2744-77-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/852-83-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 2628 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 3048 cmd.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe 2044 WerFault.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wmplayer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2628 set thread context of 2444 2628 svchost.exe 35 PID 2444 set thread context of 2744 2444 wmplayer.exe 38 PID 2444 set thread context of 852 2444 wmplayer.exe 39 PID 2444 set thread context of 1092 2444 wmplayer.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2072 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2540 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 2744 wmplayer.exe 2744 wmplayer.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2444 wmplayer.exe 2444 wmplayer.exe 2444 wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe Token: SeDebugPrivilege 2628 svchost.exe Token: SeDebugPrivilege 1092 wmplayer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2444 wmplayer.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3004 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 28 PID 1368 wrote to memory of 3004 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 28 PID 1368 wrote to memory of 3004 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 28 PID 1368 wrote to memory of 3048 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 30 PID 1368 wrote to memory of 3048 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 30 PID 1368 wrote to memory of 3048 1368 Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe 30 PID 3004 wrote to memory of 2072 3004 cmd.exe 32 PID 3004 wrote to memory of 2072 3004 cmd.exe 32 PID 3004 wrote to memory of 2072 3004 cmd.exe 32 PID 3048 wrote to memory of 2540 3048 cmd.exe 33 PID 3048 wrote to memory of 2540 3048 cmd.exe 33 PID 3048 wrote to memory of 2540 3048 cmd.exe 33 PID 3048 wrote to memory of 2628 3048 cmd.exe 34 PID 3048 wrote to memory of 2628 3048 cmd.exe 34 PID 3048 wrote to memory of 2628 3048 cmd.exe 34 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2444 2628 svchost.exe 35 PID 2628 wrote to memory of 2044 2628 svchost.exe 36 PID 2628 wrote to memory of 2044 2628 svchost.exe 36 PID 2628 wrote to memory of 2044 2628 svchost.exe 36 PID 2444 wrote to memory of 2744 2444 wmplayer.exe 38 PID 2444 wrote to memory of 2744 2444 wmplayer.exe 38 PID 2444 wrote to memory of 2744 2444 wmplayer.exe 38 PID 2444 wrote to memory of 2744 2444 wmplayer.exe 38 PID 2444 wrote to memory of 2744 2444 wmplayer.exe 38 PID 2444 wrote to memory of 852 2444 wmplayer.exe 39 PID 2444 wrote to memory of 852 2444 wmplayer.exe 39 PID 2444 wrote to memory of 852 2444 wmplayer.exe 39 PID 2444 wrote to memory of 852 2444 wmplayer.exe 39 PID 2444 wrote to memory of 852 2444 wmplayer.exe 39 PID 2444 wrote to memory of 1092 2444 wmplayer.exe 40 PID 2444 wrote to memory of 1092 2444 wmplayer.exe 40 PID 2444 wrote to memory of 1092 2444 wmplayer.exe 40 PID 2444 wrote to memory of 1092 2444 wmplayer.exe 40 PID 2444 wrote to memory of 1092 2444 wmplayer.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe"C:\Users\Admin\AppData\Local\Temp\Specification-Glycyrrhetic Acid 3-O-Glucuronide.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2072
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp11CC.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2540
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dgitityumpbxqshsvmewsqbvs"5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /stext "C:\Users\Admin\AppData\Local\Temp\oinmjmjoaxtcbydwmwrqdcnmbggz"5⤵
- Accesses Microsoft Outlook accounts
PID:852
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /stext "C:\Users\Admin\AppData\Local\Temp\ycbwjeupoflhderavhdrohivcmqadil"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2628 -s 7204⤵
- Loads dropped DLL
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338B
MD5f262190b49bb70b52ccce8e67f6e2786
SHA12023cb1307a8529703289db0823b08217a17adde
SHA25620ad98be9e8666c26ab49b595a5fb1435d4318070ce72df3010f63ac06ebb171
SHA5124a29c3d1613f2a606dc66d9d6f25722c84479fe98000f1671133dd43f9ab429f8ad231c26ce624eb3453145188bcbc35376096447cf3ab3f3a00ef60f996988e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
151B
MD5da4fe590c9d15d30cab00f1cfd47362d
SHA1ddcf32f37b7179efb9294fc28f489058d4beff4a
SHA2568870acb7de4886a72c96992d877aa5dc65a224c1c5e376b1714f111f448a3d5b
SHA51231f77479e18c5986c1dfdf3f39af09cfdea57e4e4d67ffc43bd7a1bcab28725deb146c1c57a6ac7d5d1e9b05fb3442485e66ecc4257d9b1661eb5ab65b37c103
-
Filesize
926KB
MD5a5116c0a496d4b011dd2afc12147d1b2
SHA1967e37264a5e0982b21b267211f9c5ccdc1662cf
SHA25698b668f7457089866b6364c672e8dd35b12a24899eb80fdfcfc2a5aab8d9aa5b
SHA5121d1922b3cbd0bc2e3e85ce0e787f63819a8f0a76286f58d590fecc3d5753cf78fe17ce3ecf8253117189a8f994e4b7b167aca394721bf3f1acd708f2702ffe87