Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Urgent new order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Urgent new order.exe
Resource
win10v2004-20240802-en
General
-
Target
Urgent new order.exe
-
Size
1.7MB
-
MD5
2ba2caed8e7776c9895db0a3e5e0714c
-
SHA1
a3db8f2e22f6674ec60f6fbb11adf1bf65986827
-
SHA256
1df5b2a41831081a752bfd626acb7e216d0c03b0e1b1a7c829a7348a54833c58
-
SHA512
5ca99a0247c154b78a48f0e1b9e663f4ed6f4f1a78f0ff0d93e8d8579d419051ace94d8b91d3889b83f4c227ed387641614365e0ee5e81f23f409654b86677ee
-
SSDEEP
24576:nIx+lXcmg/23DrVykOe1L2gj/EjuJajIA:nrlXc3kVJzBjIuo
Malware Config
Extracted
remcos
RemoteHost
127.0.0.1:52121
officerem.duckdns.org:52121
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-6GPUH1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1620 set thread context of 2724 1620 Urgent new order.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 436 1620 Urgent new order.exe 30 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2896 1620 Urgent new order.exe 31 PID 1620 wrote to memory of 2948 1620 Urgent new order.exe 32 PID 1620 wrote to memory of 2948 1620 Urgent new order.exe 32 PID 1620 wrote to memory of 2948 1620 Urgent new order.exe 32 PID 1620 wrote to memory of 2948 1620 Urgent new order.exe 32 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2852 1620 Urgent new order.exe 33 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 2724 1620 Urgent new order.exe 34 PID 1620 wrote to memory of 1944 1620 Urgent new order.exe 35 PID 1620 wrote to memory of 1944 1620 Urgent new order.exe 35 PID 1620 wrote to memory of 1944 1620 Urgent new order.exe 35 PID 1620 wrote to memory of 1944 1620 Urgent new order.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urgent new order.exe"C:\Users\Admin\AppData\Local\Temp\Urgent new order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:436
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"2⤵PID:2852
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵PID:1944
-