Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
AWB81311002907.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB81311002907.exe
Resource
win10v2004-20240802-en
General
-
Target
AWB81311002907.exe
-
Size
931KB
-
MD5
c8b97aad582adb6ccddc6f3e74bda215
-
SHA1
bbf2e45bd5af0695f5f82fed5728a480a7fd4c04
-
SHA256
d26670d5f425962b546d10ecd4d148f5884a3f392afe1c5fb4426466d4454c34
-
SHA512
7ede8146da39ea716cd6c64f3a60ca324566c3000cb5c1275f5f1563cca726ec8b97420c7e4620f4fe998f8542896bb99294cef83a7e8bfae2e1e46fb4bbc100
-
SSDEEP
24576:9elw4o5E6Gkf1CGkuH2sz6rtlHa08qsCJAUke0O:9elw4o5E+C1ttl605X3ko
Malware Config
Extracted
remcos
Sept. 04C
154.216.20.211:6902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YGC9WY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2188-55-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/1492-60-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/2200-61-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1492-60-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2188-55-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2572 powershell.exe 2936 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AWB81311002907.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2764 set thread context of 1704 2764 AWB81311002907.exe 36 PID 1704 set thread context of 2188 1704 AWB81311002907.exe 37 PID 1704 set thread context of 1492 1704 AWB81311002907.exe 38 PID 1704 set thread context of 2200 1704 AWB81311002907.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2936 powershell.exe 2572 powershell.exe 2188 AWB81311002907.exe 2188 AWB81311002907.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1704 AWB81311002907.exe 1704 AWB81311002907.exe 1704 AWB81311002907.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2200 AWB81311002907.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 AWB81311002907.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2572 2764 AWB81311002907.exe 30 PID 2764 wrote to memory of 2572 2764 AWB81311002907.exe 30 PID 2764 wrote to memory of 2572 2764 AWB81311002907.exe 30 PID 2764 wrote to memory of 2572 2764 AWB81311002907.exe 30 PID 2764 wrote to memory of 2936 2764 AWB81311002907.exe 32 PID 2764 wrote to memory of 2936 2764 AWB81311002907.exe 32 PID 2764 wrote to memory of 2936 2764 AWB81311002907.exe 32 PID 2764 wrote to memory of 2936 2764 AWB81311002907.exe 32 PID 2764 wrote to memory of 2956 2764 AWB81311002907.exe 33 PID 2764 wrote to memory of 2956 2764 AWB81311002907.exe 33 PID 2764 wrote to memory of 2956 2764 AWB81311002907.exe 33 PID 2764 wrote to memory of 2956 2764 AWB81311002907.exe 33 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 2764 wrote to memory of 1704 2764 AWB81311002907.exe 36 PID 1704 wrote to memory of 2188 1704 AWB81311002907.exe 37 PID 1704 wrote to memory of 2188 1704 AWB81311002907.exe 37 PID 1704 wrote to memory of 2188 1704 AWB81311002907.exe 37 PID 1704 wrote to memory of 2188 1704 AWB81311002907.exe 37 PID 1704 wrote to memory of 2188 1704 AWB81311002907.exe 37 PID 1704 wrote to memory of 1492 1704 AWB81311002907.exe 38 PID 1704 wrote to memory of 1492 1704 AWB81311002907.exe 38 PID 1704 wrote to memory of 1492 1704 AWB81311002907.exe 38 PID 1704 wrote to memory of 1492 1704 AWB81311002907.exe 38 PID 1704 wrote to memory of 1492 1704 AWB81311002907.exe 38 PID 1704 wrote to memory of 2200 1704 AWB81311002907.exe 39 PID 1704 wrote to memory of 2200 1704 AWB81311002907.exe 39 PID 1704 wrote to memory of 2200 1704 AWB81311002907.exe 39 PID 1704 wrote to memory of 2200 1704 AWB81311002907.exe 39 PID 1704 wrote to memory of 2200 1704 AWB81311002907.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iVWcGN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iVWcGN" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC41A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\fybezcxdulyatetnfuwkgzdxaxmdxux"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\psgxzvixitqfvlprofiereqojdvmyfvzyd"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\znthan"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5726a1e0de5ba073c3410f58757dd5f37
SHA101276927d60b2825197f85c402f04b9690ef1d4c
SHA2561276a9a4224010c2108ff4adf00c3d7147497129ccbf23699fbaf3484a09ada1
SHA512ddcb1be5b81782ba0db593582961d334ab7a2ec91ec1b439f736ac6e17f44742fea75261164e36e5bb46af4e3095f7f829fb7c15ad93eef2781ac8b2916ff8d0
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5e67cf4eddcd747efe54661357d13358e
SHA13542abd98086c253d799ac8feade2b8c7c850259
SHA256bb25112ddf85019135581518cce488d81af2f8a75858cfc754d01825c8033b5e
SHA512853fc81c2b179c5a98f21531d95fa1d56f909368ded62568db0cc9cd5980a685a5daf92ca10522c2976ef7f176e7c481486582542ab40096a76c5471921b2dfb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ec3540b4ec1b85748aee6f912a2acd52
SHA144c5dc71356e8e28f7ada7f9ba827c27e23c2212
SHA2566f19caadef991825ed139bfb12f9c143975f6612c5fcf03a5671a1d08939615e
SHA5122c14fa1365bc2a5996c8641bd629bd275cc7da33afb32fec6b2d07c690b72bfac1bef6b30ba1928acbb3451d917733831d958a75fcd6909bb9190971a3f96838