Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
AWB81311002907.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AWB81311002907.exe
Resource
win10v2004-20240802-en
General
-
Target
AWB81311002907.exe
-
Size
931KB
-
MD5
c8b97aad582adb6ccddc6f3e74bda215
-
SHA1
bbf2e45bd5af0695f5f82fed5728a480a7fd4c04
-
SHA256
d26670d5f425962b546d10ecd4d148f5884a3f392afe1c5fb4426466d4454c34
-
SHA512
7ede8146da39ea716cd6c64f3a60ca324566c3000cb5c1275f5f1563cca726ec8b97420c7e4620f4fe998f8542896bb99294cef83a7e8bfae2e1e46fb4bbc100
-
SSDEEP
24576:9elw4o5E6Gkf1CGkuH2sz6rtlHa08qsCJAUke0O:9elw4o5E+C1ttl605X3ko
Malware Config
Extracted
remcos
Sept. 04C
154.216.20.211:6902
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-YGC9WY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4900-82-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/924-81-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/3704-84-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3704-84-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/924-81-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3852 powershell.exe 3236 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation AWB81311002907.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AWB81311002907.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3948 set thread context of 2160 3948 AWB81311002907.exe 104 PID 2160 set thread context of 924 2160 AWB81311002907.exe 105 PID 2160 set thread context of 3704 2160 AWB81311002907.exe 106 PID 2160 set thread context of 4900 2160 AWB81311002907.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AWB81311002907.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3236 powershell.exe 3852 powershell.exe 3852 powershell.exe 3236 powershell.exe 4900 AWB81311002907.exe 924 AWB81311002907.exe 4900 AWB81311002907.exe 924 AWB81311002907.exe 924 AWB81311002907.exe 924 AWB81311002907.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2160 AWB81311002907.exe 2160 AWB81311002907.exe 2160 AWB81311002907.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 4900 AWB81311002907.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2160 AWB81311002907.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3852 3948 AWB81311002907.exe 98 PID 3948 wrote to memory of 3852 3948 AWB81311002907.exe 98 PID 3948 wrote to memory of 3852 3948 AWB81311002907.exe 98 PID 3948 wrote to memory of 3236 3948 AWB81311002907.exe 100 PID 3948 wrote to memory of 3236 3948 AWB81311002907.exe 100 PID 3948 wrote to memory of 3236 3948 AWB81311002907.exe 100 PID 3948 wrote to memory of 4364 3948 AWB81311002907.exe 102 PID 3948 wrote to memory of 4364 3948 AWB81311002907.exe 102 PID 3948 wrote to memory of 4364 3948 AWB81311002907.exe 102 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 3948 wrote to memory of 2160 3948 AWB81311002907.exe 104 PID 2160 wrote to memory of 924 2160 AWB81311002907.exe 105 PID 2160 wrote to memory of 924 2160 AWB81311002907.exe 105 PID 2160 wrote to memory of 924 2160 AWB81311002907.exe 105 PID 2160 wrote to memory of 924 2160 AWB81311002907.exe 105 PID 2160 wrote to memory of 3704 2160 AWB81311002907.exe 106 PID 2160 wrote to memory of 3704 2160 AWB81311002907.exe 106 PID 2160 wrote to memory of 3704 2160 AWB81311002907.exe 106 PID 2160 wrote to memory of 3704 2160 AWB81311002907.exe 106 PID 2160 wrote to memory of 4900 2160 AWB81311002907.exe 107 PID 2160 wrote to memory of 4900 2160 AWB81311002907.exe 107 PID 2160 wrote to memory of 4900 2160 AWB81311002907.exe 107 PID 2160 wrote to memory of 4900 2160 AWB81311002907.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iVWcGN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iVWcGN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp40AE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\bvyyznwvudzi"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\eydrafgwplrnsssa"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\AWB81311002907.exeC:\Users\Admin\AppData\Local\Temp\AWB81311002907.exe /stext "C:\Users\Admin\AppData\Local\Temp\osjkbqrqdtjscggeemm"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5aca7d568a31abca0c2ded173879dde92
SHA1e546201633d3f65117d5e2d447bae164352085ab
SHA2562bae5ca60e156c875d0eb8f3b0e6f294938ac335a10efd7011189d0ed94c21bc
SHA512a4b8f170ad3fedae61e6d79ff2e440a869827af21a51b2c3ff101d7416e1a4414cd8ab248719b8fdd1516496c848e6d5655cc6cc39c328202d7c77c0f78d9db0
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD51cfc48ab1235c3d6b8903e76d97476df
SHA1fa606a34716fd4002b1f16a2ede7e4bd18a16208
SHA256dd6286323ac59b412c4ec574c3405cd967b3f63a964d27de09b1a97221823726
SHA5121bffe2c14f7e572a711b1febe7b2d7e48edb68102af0cc9e500cc909f8269905cba72c1f9d0dd7aceacb6f9d6b79fea84b8a70f862fb512bc45d64ccb4b0936f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD51891919175c888ce82e9bd8a047b01ad
SHA1502a6892a5d27ecb791ac5aa6d8586944f540453
SHA256a6c43b4e4b8681cf0ef56c49c730fa77e34dc82db0260253a3ba75039030b9ec
SHA5128bb940050b1abf6c27db133ed446f41e108f670f361ed5102408832ce33d9b87cd0880723441f1632292eeeb0a319c4e0fac0ea659eb55ebe1130cc3e6c776a3
-
Filesize
1KB
MD5a9256b814eaa694e8a89614a955b9cba
SHA16617925e66e8995a87c5e37e1edaa2edf67faa1c
SHA256148c4ca53b236cf5b81d1e5e6a62fa63819a21231de6cef323038b0a33339443
SHA5129632e4ff6aad37b124e0d022a21e766839abc4293ddb516f8ecf5dabd56bdf97f04cd9f1cc1a29291ae5a74a2133cf6a814a3b3e9441d61aeeb88a68cf9cacdc