Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 19:48
Behavioral task
behavioral1
Sample
HOTFIX.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
HOTFIX.exe
Resource
win10v2004-20240704-en
General
-
Target
HOTFIX.exe
-
Size
92KB
-
MD5
49dea8978a30fad5001a5f689b7f15e1
-
SHA1
317c883761e60af918ab9748d7417d931963849f
-
SHA256
d138d810c8b0d8770b31b62f87a2b51bdf33ac1920b41a80007ed718397e7390
-
SHA512
dc3c29adbd1ad52bcba7fb0b24985798abc51c90984f3b556b448380c036407b92bf6f4275252c0e864b330aea00de6f0096945286f28be1a415fde20833c0dd
-
SSDEEP
1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP60rj:uhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+3
Malware Config
Extracted
remcos
1.7 Pro
Host
to-adam.gl.at.ply.gg:65290
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_icbwxxlmpc
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%Temp%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation HOTFIX.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" HOTFIX.exe Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ HOTFIX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ remcos.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4448 set thread context of 4052 4448 remcos.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2072 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4448 remcos.exe 4448 remcos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4052 iexplore.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1436 3080 HOTFIX.exe 85 PID 3080 wrote to memory of 1436 3080 HOTFIX.exe 85 PID 3080 wrote to memory of 1436 3080 HOTFIX.exe 85 PID 1436 wrote to memory of 2072 1436 cmd.exe 87 PID 1436 wrote to memory of 2072 1436 cmd.exe 87 PID 1436 wrote to memory of 2072 1436 cmd.exe 87 PID 1436 wrote to memory of 4448 1436 cmd.exe 88 PID 1436 wrote to memory of 4448 1436 cmd.exe 88 PID 1436 wrote to memory of 4448 1436 cmd.exe 88 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89 PID 4448 wrote to memory of 4052 4448 remcos.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\HOTFIX.exe"C:\Users\Admin\AppData\Local\Temp\HOTFIX.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2072
-
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:4052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD576c1687d97dfdbcea62ef1490bec5001
SHA15f4d1aeafa7d840cde67b76f97416dd68efd1bed
SHA25679f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4
SHA512da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925
-
Filesize
92KB
MD549dea8978a30fad5001a5f689b7f15e1
SHA1317c883761e60af918ab9748d7417d931963849f
SHA256d138d810c8b0d8770b31b62f87a2b51bdf33ac1920b41a80007ed718397e7390
SHA512dc3c29adbd1ad52bcba7fb0b24985798abc51c90984f3b556b448380c036407b92bf6f4275252c0e864b330aea00de6f0096945286f28be1a415fde20833c0dd