Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
order specification.pif.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
order specification.pif.exe
Resource
win10v2004-20240802-en
General
-
Target
order specification.pif.exe
-
Size
862KB
-
MD5
32fdfac1be3eeb287976d70b621ba718
-
SHA1
2dd9ced6021c1f1e8f772ead665e70ee4250c238
-
SHA256
c1f36f8ad9a6360ed406ff3e84dd9b9a765e6edea3d9beb7e5c303230001fd13
-
SHA512
a77441898821e5f84c860c05ea62357851330693d1566ff60ea47676efef0846e99192d1ba51d8a5569b2b93acf697eccb0ecf047ed17ab58a9453fd5af32cba
-
SSDEEP
24576:PYZIth8N9PnPo2SxApB3x8uYU66U25BL:Pvth8N5Po2rpH8uYUOA
Malware Config
Extracted
remcos
RemoteHost
www.drechftankholding.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
dfgh
-
mouse_option
false
-
mutex
Rmc-8J6PG9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2776 powershell.exe 2936 powershell.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 2800 1820 order specification.pif.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language order specification.pif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1820 order specification.pif.exe 2776 powershell.exe 2936 powershell.exe 1820 order specification.pif.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1820 order specification.pif.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 vbc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2776 1820 order specification.pif.exe 31 PID 1820 wrote to memory of 2776 1820 order specification.pif.exe 31 PID 1820 wrote to memory of 2776 1820 order specification.pif.exe 31 PID 1820 wrote to memory of 2776 1820 order specification.pif.exe 31 PID 1820 wrote to memory of 2936 1820 order specification.pif.exe 33 PID 1820 wrote to memory of 2936 1820 order specification.pif.exe 33 PID 1820 wrote to memory of 2936 1820 order specification.pif.exe 33 PID 1820 wrote to memory of 2936 1820 order specification.pif.exe 33 PID 1820 wrote to memory of 2780 1820 order specification.pif.exe 34 PID 1820 wrote to memory of 2780 1820 order specification.pif.exe 34 PID 1820 wrote to memory of 2780 1820 order specification.pif.exe 34 PID 1820 wrote to memory of 2780 1820 order specification.pif.exe 34 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37 PID 1820 wrote to memory of 2800 1820 order specification.pif.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\order specification.pif.exe"C:\Users\Admin\AppData\Local\Temp\order specification.pif.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\order specification.pif.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sOjQJdX.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sOjQJdX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE437.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD505688c5a0af76d23210837d57f35cbf4
SHA1c8b4e6c2fb47b133d55c1c20468a6b9dacd72ea6
SHA256e55d1630c37fa75eb1e5464337f3d7e39c93eb0fa6446f856d6f57fccfd99a70
SHA512a0e1846fbf9b39c6c526eff9e084f50ff7d9169b1c7e75debf23ca4adf4dc784370fd8294741e29d4c662191a38fdd193ba5c5fa7cea50c1b0043346488c59eb
-
Filesize
1KB
MD526ce64fd5d54176ee668fa7a2bae39a4
SHA17726bf2ac785c922c3f636cb10fc28b0d75fd6eb
SHA2560888875867d7738fc5386036f39f28d1611f4257d7607a442d8f3c067416c1a6
SHA512e3be4774d63820732e84e7eaa7995fbdb296bca9efc28f05017f942d0874ce9e3c83c8be53218bbf4232384e56b37295e3e580bdc71b9253eb0af4e0da5f9ef1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BDPAL5VQ3L7THGV32CZG.temp
Filesize7KB
MD5c0fa300a5a530fe005d6114b7f430d7c
SHA1f2affac4f0d9f3baab3eb81d5e872031c34891e9
SHA25682427bbc144d0885354ef22bb489df4bddffed2d4bacd7a350ec837916939a98
SHA5128ea49506294650a7df8288f2a18514bad873ec0087b2c5af77428f86fc534ffce5ab71472c713ab266753e0cd9665eb6ba3e63281edee7b60d9df683b46b7078