Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 19:42

General

  • Target

    with-editor.exe

  • Size

    5.4MB

  • MD5

    af5e828d540131192c4467424306a35e

  • SHA1

    76e1bb985e723a68aa89a4befbc6bd4f13e0b6ee

  • SHA256

    5e0ccd493f01f7cde38bd8b42ad3ab0fadd00b1970f9f1b7e8204dfdc000436f

  • SHA512

    9b087d75b79f0841bee65b635f52452d2a805a438e7ed0f1947e49cace78b122620f95eb9ded67992425143591aed14d5175025c5f34c695c4fe1857808fd289

  • SSDEEP

    98304:w59KDJowUykzN5k2IQfo+KIa86OXh7xz0TV60hgNnqmWUp5FTurs57UxGQEdCddm:fFowjgN5bLKIaC7xg5j+hd7FTuIp9ktm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\with-editor.exe
    "C:\Users\Admin\AppData\Local\Temp\with-editor.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\is-M3CF5.tmp\with-editor.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-M3CF5.tmp\with-editor.tmp" /SL5="$6023C,5359530,57856,C:\Users\Admin\AppData\Local\Temp\with-editor.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse.exe
        "C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse-TaskMgr.exe
          "C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse-TaskMgr.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-M3CF5.tmp\with-editor.tmp

    Filesize

    697KB

    MD5

    832dab307e54aa08f4b6cdd9b9720361

    SHA1

    ebd007fb7482040ecf34339e4bf917209c1018df

    SHA256

    cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

    SHA512

    358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse-TaskMgr.exe

    Filesize

    1.1MB

    MD5

    895338fdcacb22ff49e476a5b5a01218

    SHA1

    4ea0731c55422fbe037dd5ddff63d9e94441edbd

    SHA256

    1ad3a624a7ce606e4d460255b7a724c2e4555414638e41dec75d7a5632960c6d

    SHA512

    30f32b480c0de2deecf90fd0d98cbe6d6f9d199c1ea9bcf35f27e448d6c4d42eef4ea3df50ece1e9baa8bea643ec2b0559f9b5e917eee74aa0dad4faf817ce1a

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\ReMouse.exe

    Filesize

    1.3MB

    MD5

    f3b864b4fc3e090e8ad3ead18a2c20f3

    SHA1

    a3f627b76d6f5cbf6d3b4d559a9aea89241f6130

    SHA256

    b5dfb4e59f1764bad01615d94ace06b7c45d4d51d36bbc0f9cbafc2762e47906

    SHA512

    629ce00bdca3975b9f396915106397ca58a3117e566af902c1aaa4ab7f6f19f66cdd513879ac3543dfa589b3060d8a8b96bdb20e8a0c1049d1abb1f6e1ab1960

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\ext\app_ico.ico

    Filesize

    112KB

    MD5

    61a64215a9f924a636c6518e04514391

    SHA1

    40448fdbb261e29db28cc3a4732f88e8802a72cc

    SHA256

    43cb0559c6f67133c9f43ffbfc9e0ec20bd2ee16fc6a4cc21be26cbc15c6dd20

    SHA512

    fe1224aedffa7907e6c9c903bee74d194cf04bce2f61f630c174c80aa626474c9c90bd564fdc2814ffa1b46e463c8e564b1081b3ff2b13d740c0b46e1d19c56b

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\ext\icons.dll

    Filesize

    169KB

    MD5

    32ee6173f137080755bb5127e39ace9e

    SHA1

    e9c2bc7f5388ce262e2e2ada5637cc2884b7bcbc

    SHA256

    fe1ea3f712f6883025ecd8cd9553ff0e26189110bdc059a304305b14278d1726

    SHA512

    191201f067ecb39f8d0e9aa0c4e8a312b660039132d7354448794498cea405ee4f2e691398443717fb35ca32aa88ea628c583a10cb55e698b2bf0097995265e8

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\ext\mskbcodes.ini

    Filesize

    2KB

    MD5

    137eb2bae98810f3c549813e3832b3e4

    SHA1

    556f2983410fc22502c29e612003013051766486

    SHA256

    629fbdca845cb530c5335675f85ce6b517d4c2b961874e317b869ae4c706699b

    SHA512

    80539c43730d56c02df9a8fd229395e648b9f35faf24c9044b801884d9b29a7fa0df0b8a66851fb4cc8319eaf70c726ebef7f4ca4ac8b318cf1dc5cfaa502344

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\rms_conf.ini

    Filesize

    435B

    MD5

    f9107282ad3e82b1160e1ace323f358e

    SHA1

    b0a5ee7380d7d70b4ca307313d1b093b858312fd

    SHA256

    649ccfa8a0d93c02fd5d6b1cf2db4a0fa4b828810540823a68f6a7c6dd286ac4

    SHA512

    3a068f39cd42f1049e9b19cada95124d7d936f90068ddafc1999fd6c5c40ba25fe458fcf19eafe0cd6d601d973b76a0a82e0a97d8ae525c0accab0581f456e23

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\rms_conf.ini

    Filesize

    435B

    MD5

    233e5c8b7abe25dc6ae2b963cfa5b868

    SHA1

    85f42a5f790cdb7b71f400dfd637a6877e31cc9e

    SHA256

    5ab617392ad9e4ba72ea11a16dcf9932c8ea6bdcb02736371911bb7070cab244

    SHA512

    212e9fecec21f444ee25493c5e9000bbff6d49c2980c455199b5637637f297dba22e878f4a9a4fda601bb48e626b2736be6721e6509c018b943f3a769771905a

  • C:\Users\Admin\AppData\Roaming\AutomaticSolution Software\ReMouse Standard\conf\rms_tasks_conf.ini

    Filesize

    285B

    MD5

    3ed951c332c0c1176dcb20a99868b3a2

    SHA1

    8f2b3750fa5855f7396a0935c0a9e29301f8a8ce

    SHA256

    94c4be28c7247cf7fe24e54d236403fef381853decbd6929565a7e52c00e3ef4

    SHA512

    2ce60a9b79531d7ecc4a8f0cd1924191c5258bbceeba1502f75d8dc1fcda4d050e55cb506aa2d69f289a6e6a10dc8ab6b5dc2b160a6d10c787971e5f60c8921c

  • memory/2832-73-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2832-91-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/4528-71-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4528-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4528-3-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/4780-68-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/4780-69-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/4780-6-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB