Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 16:31
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20240802-en
General
-
Target
a.exe
-
Size
453KB
-
MD5
02d693c186871b0aba2101233ee64173
-
SHA1
f5786f6346286e9e61f2c4cde7cf0dd877d103da
-
SHA256
ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c
-
SHA512
aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768
-
SSDEEP
12288:Emnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSbn9:8iLJbpI7I2WhQqZ7b9
Malware Config
Extracted
remcos
New
173.212.217.108:1050
zab4ever.no-ip.org:1050
1zab4ever.no-ip.org:1050
1zab4ever.duckdns.org:1050
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
BrowseUpdt.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
nobita.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
khruioprs-T021C4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
BrowseUpdt
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation a.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3408 BrowseUpdt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BrowseUpdt = "\"C:\\Users\\Admin\\AppData\\Roaming\\BrowseUpdt.exe\"" a.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BrowseUpdt = "\"C:\\Users\\Admin\\AppData\\Roaming\\BrowseUpdt.exe\"" BrowseUpdt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3408 set thread context of 636 3408 BrowseUpdt.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrowseUpdt.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3408 BrowseUpdt.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3760 4248 a.exe 83 PID 4248 wrote to memory of 3760 4248 a.exe 83 PID 4248 wrote to memory of 3760 4248 a.exe 83 PID 3760 wrote to memory of 1816 3760 WScript.exe 87 PID 3760 wrote to memory of 1816 3760 WScript.exe 87 PID 3760 wrote to memory of 1816 3760 WScript.exe 87 PID 1816 wrote to memory of 3408 1816 cmd.exe 89 PID 1816 wrote to memory of 3408 1816 cmd.exe 89 PID 1816 wrote to memory of 3408 1816 cmd.exe 89 PID 3408 wrote to memory of 636 3408 BrowseUpdt.exe 90 PID 3408 wrote to memory of 636 3408 BrowseUpdt.exe 90 PID 3408 wrote to memory of 636 3408 BrowseUpdt.exe 90 PID 3408 wrote to memory of 636 3408 BrowseUpdt.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\BrowseUpdt.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Roaming\BrowseUpdt.exeC:\Users\Admin\AppData\Roaming\BrowseUpdt.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵PID:636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5983609782eefdfb08a07ef630996dc0c
SHA147d060bf4d7ce66d807aa246e4a78ce3c1ac29b0
SHA25638b85ad30d0626119e9e2f40b5b5a4279ae2f1929bf623083568cd3b1c3bf935
SHA512ebadf7e339214da369e25ab6ca2bc19799d99e2e4fffc9b79d57e747eacdb62aa3fd41d1efae4250ac0536a0b60e541b4a5b2323ea59c09f2fdb8fdee248733d
-
Filesize
453KB
MD502d693c186871b0aba2101233ee64173
SHA1f5786f6346286e9e61f2c4cde7cf0dd877d103da
SHA256ec8ecee61aeab54e0622706710e9cbe56cdda7d2b47c5d13ef343092c868120c
SHA512aa2948a490ed50dbfc8568ee9c521ab52e136894cb5f012d0879640cda5af5de1c41579dbe463bfe15580c51b892155e39bf0bfa883f5fd79d37285b2abeb768