Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe
Resource
win10v2004-20240226-en
General
-
Target
e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe
-
Size
1.5MB
-
MD5
727ef110c7a27f21d4bbfc8b0e2edd92
-
SHA1
6e05d62821268c5d783d53ccde347b9a6ca588c8
-
SHA256
e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736
-
SHA512
661a0b4005a001e01e62d33ff05650ebad1164a9845aa5b2a9ec277e061acb798bd3ab04cd41335c15db694b13a00d9d31f3428120bc7e1af17aa78e3b8e310a
-
SSDEEP
24576:2D39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjoc:2p7E+QrFUBgq2R
Malware Config
Extracted
remcos
1.7 Pro
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
detects Windows exceutables potentially bypassing UAC using eventvwr.exe 9 IoCs
resource yara_rule behavioral1/memory/2712-57-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-66-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-65-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-64-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-61-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-60-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-53-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-51-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer behavioral1/memory/2712-70-0x0000000000400000-0x0000000000417000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer -
Executes dropped EXE 2 IoCs
pid Process 2612 sbietrcl.exe 2712 sbietrcl.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2612 sbietrcl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\sbietrcl.exe" e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2612 set thread context of 2712 2612 sbietrcl.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 2612 sbietrcl.exe 2612 sbietrcl.exe 2612 sbietrcl.exe 2612 sbietrcl.exe 2612 sbietrcl.exe 2612 sbietrcl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe Token: SeDebugPrivilege 2612 sbietrcl.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2712 sbietrcl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2612 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 28 PID 2032 wrote to memory of 2612 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 28 PID 2032 wrote to memory of 2612 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 28 PID 2032 wrote to memory of 2612 2032 e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe 28 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29 PID 2612 wrote to memory of 2712 2612 sbietrcl.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe"C:\Users\Admin\AppData\Local\Temp\e1d3e9feb67fde0b13f317d2bbfe700a6cc1249658b7b5a6970c944872a2e736.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sbietrcl.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ef7deec9bf63035ecac4c748a0b1a9
SHA193c8e48f2e650664311badabb72b39f0f0937b92
SHA256002822def6b3123cfd8cd064087a3430789456b701aa987bf7ea257e745139e9
SHA512db2c1f701cebca8d6e38b06ec211a6c565261abfcb609a6d2ad170cdd9136075af74220f862f1bf4fee4fe700ad7e93f1286d14e046635a0c9fc4d29943a20a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1.5MB
MD5b52ecf4823be7100eea7b8eafc1e9d40
SHA1b13e181f17ea3993edecbf48403e53c97ed7caa2
SHA25686335e3ec1f2ec66a36a3aec395890819770588786af63e833c5da983b9ae565
SHA51224438ea4970e7d0835a3524974a1c5895122ead04203796f6103f53739a1534636e51233d10f4715e78c91647db7b7e677a9f65ddc566a92ec9c2d3e4133ac7e