Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 19:48
Behavioral task
behavioral1
Sample
HOTFIX.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
HOTFIX.exe
Resource
win10v2004-20240704-en
General
-
Target
HOTFIX.exe
-
Size
92KB
-
MD5
49dea8978a30fad5001a5f689b7f15e1
-
SHA1
317c883761e60af918ab9748d7417d931963849f
-
SHA256
d138d810c8b0d8770b31b62f87a2b51bdf33ac1920b41a80007ed718397e7390
-
SHA512
dc3c29adbd1ad52bcba7fb0b24985798abc51c90984f3b556b448380c036407b92bf6f4275252c0e864b330aea00de6f0096945286f28be1a415fde20833c0dd
-
SSDEEP
1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP60rj:uhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+3
Malware Config
Extracted
remcos
1.7 Pro
Host
to-adam.gl.at.ply.gg:65290
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_icbwxxlmpc
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%Temp%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Executes dropped EXE 1 IoCs
pid Process 2628 remcos.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 cmd.exe 2968 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ HOTFIX.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2540 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2628 remcos.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2628 remcos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 remcos.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2280 wrote to memory of 2968 2280 HOTFIX.exe 28 PID 2968 wrote to memory of 2540 2968 cmd.exe 30 PID 2968 wrote to memory of 2540 2968 cmd.exe 30 PID 2968 wrote to memory of 2540 2968 cmd.exe 30 PID 2968 wrote to memory of 2540 2968 cmd.exe 30 PID 2968 wrote to memory of 2628 2968 cmd.exe 31 PID 2968 wrote to memory of 2628 2968 cmd.exe 31 PID 2968 wrote to memory of 2628 2968 cmd.exe 31 PID 2968 wrote to memory of 2628 2968 cmd.exe 31 PID 2628 wrote to memory of 2476 2628 remcos.exe 32 PID 2628 wrote to memory of 2476 2628 remcos.exe 32 PID 2628 wrote to memory of 2476 2628 remcos.exe 32 PID 2628 wrote to memory of 2476 2628 remcos.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\HOTFIX.exe"C:\Users\Admin\AppData\Local\Temp\HOTFIX.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2540
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:2476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD576c1687d97dfdbcea62ef1490bec5001
SHA15f4d1aeafa7d840cde67b76f97416dd68efd1bed
SHA25679f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4
SHA512da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925
-
Filesize
92KB
MD549dea8978a30fad5001a5f689b7f15e1
SHA1317c883761e60af918ab9748d7417d931963849f
SHA256d138d810c8b0d8770b31b62f87a2b51bdf33ac1920b41a80007ed718397e7390
SHA512dc3c29adbd1ad52bcba7fb0b24985798abc51c90984f3b556b448380c036407b92bf6f4275252c0e864b330aea00de6f0096945286f28be1a415fde20833c0dd