Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2024, 11:52

General

  • Target

    orderspecification.pif.exe

  • Size

    862KB

  • MD5

    32fdfac1be3eeb287976d70b621ba718

  • SHA1

    2dd9ced6021c1f1e8f772ead665e70ee4250c238

  • SHA256

    c1f36f8ad9a6360ed406ff3e84dd9b9a765e6edea3d9beb7e5c303230001fd13

  • SHA512

    a77441898821e5f84c860c05ea62357851330693d1566ff60ea47676efef0846e99192d1ba51d8a5569b2b93acf697eccb0ecf047ed17ab58a9453fd5af32cba

  • SSDEEP

    24576:PYZIth8N9PnPo2SxApB3x8uYU66U25BL:Pvth8N5Po2rpH8uYUOA

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

www.drechftankholding.com:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    dfgh

  • mouse_option

    false

  • mutex

    Rmc-8J6PG9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\orderspecification.pif.exe
    "C:\Users\Admin\AppData\Local\Temp\orderspecification.pif.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\orderspecification.pif.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sOjQJdX.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3496
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sOjQJdX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD031.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3952
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\trnvvpmnkulqjfoekidyianuaqpm"
        3⤵
          PID:3824
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\trnvvpmnkulqjfoekidyianuaqpm"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4636
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\wlsowaxpycddttcibsqzlfidbfhvfif"
          3⤵
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:1728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\gnxg"
          3⤵
            PID:1764
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\gnxg"
            3⤵
              PID:4340
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\gnxg"
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2500

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\dfgh\logs.dat

          Filesize

          144B

          MD5

          ed9adbce4f5db464fb8403001de62a97

          SHA1

          a23181699f453274f6958b964a95adbde43eccbd

          SHA256

          a9fa6a1454ed4a1ffab72648061c4c657511a60f6ff3fb7090accb58150d548a

          SHA512

          376930b4f2e52b5a3b79af858820703b0f7588b3cfa259aee1e5a035d8cf7dbfd570b9eb8fea7e7e09d5311bd3297d34b2275c1f45f82aca14400dfd7954dc48

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          3d086a433708053f9bf9523e1d87a4e8

          SHA1

          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

          SHA256

          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

          SHA512

          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          7d53872ed1d9c36d8ae345a1771ea7db

          SHA1

          09ee5b6e48658a87070c6c784db716ff29d0391e

          SHA256

          2dd94923abc62d6603837ad4c7b753bafe0a03a93e2b2c675837c4018cedd715

          SHA512

          baee43d7522d17c0014c45c31e272716451480036b4fc686c13c9e4897ba6a578c2738d37501a2b5e832e51dab778351e1e403b454e909dbaffd40a834a75537

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i5ohvz5d.3kj.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmpD031.tmp

          Filesize

          1KB

          MD5

          7b2a2198160b22894b8d69121dee4982

          SHA1

          4599324da16535409b1f0ed353ae917aaad3c1aa

          SHA256

          a22a376ae52d552d93052f731ecd1306b9ade40ff71a7b862732602e844d9dc1

          SHA512

          b47fd5246963fed24e169fcb5a6ff57ed6c0c38e342c592de66468c2e146a731b0949ccebdc12b946854311107ada81556e07979d30321d4ed5e8297c5667978

        • C:\Users\Admin\AppData\Local\Temp\trnvvpmnkulqjfoekidyianuaqpm

          Filesize

          4KB

          MD5

          1891919175c888ce82e9bd8a047b01ad

          SHA1

          502a6892a5d27ecb791ac5aa6d8586944f540453

          SHA256

          a6c43b4e4b8681cf0ef56c49c730fa77e34dc82db0260253a3ba75039030b9ec

          SHA512

          8bb940050b1abf6c27db133ed446f41e108f670f361ed5102408832ce33d9b87cd0880723441f1632292eeeb0a319c4e0fac0ea659eb55ebe1130cc3e6c776a3

        • memory/552-0-0x00000000745CE000-0x00000000745CF000-memory.dmp

          Filesize

          4KB

        • memory/552-7-0x00000000745CE000-0x00000000745CF000-memory.dmp

          Filesize

          4KB

        • memory/552-8-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/552-9-0x0000000006C90000-0x0000000006D50000-memory.dmp

          Filesize

          768KB

        • memory/552-10-0x00000000092E0000-0x000000000937C000-memory.dmp

          Filesize

          624KB

        • memory/552-1-0x0000000000780000-0x000000000085E000-memory.dmp

          Filesize

          888KB

        • memory/552-2-0x0000000005830000-0x0000000005DD4000-memory.dmp

          Filesize

          5.6MB

        • memory/552-55-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/552-3-0x0000000005280000-0x0000000005312000-memory.dmp

          Filesize

          584KB

        • memory/552-4-0x0000000005210000-0x000000000521A000-memory.dmp

          Filesize

          40KB

        • memory/552-6-0x0000000005260000-0x000000000526E000-memory.dmp

          Filesize

          56KB

        • memory/552-5-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/1728-105-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1728-107-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1728-109-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2052-57-0x0000000005FF0000-0x000000000600E000-memory.dmp

          Filesize

          120KB

        • memory/2052-23-0x0000000005030000-0x0000000005052000-memory.dmp

          Filesize

          136KB

        • memory/2052-66-0x0000000073090000-0x00000000730DC000-memory.dmp

          Filesize

          304KB

        • memory/2052-65-0x00000000071A0000-0x00000000071D2000-memory.dmp

          Filesize

          200KB

        • memory/2052-39-0x00000000059F0000-0x0000000005D44000-memory.dmp

          Filesize

          3.3MB

        • memory/2052-77-0x0000000007160000-0x000000000717E000-memory.dmp

          Filesize

          120KB

        • memory/2052-24-0x00000000050D0000-0x0000000005136000-memory.dmp

          Filesize

          408KB

        • memory/2052-19-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/2052-18-0x00000000051A0000-0x00000000057C8000-memory.dmp

          Filesize

          6.2MB

        • memory/2052-103-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/2052-17-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/2052-90-0x0000000007380000-0x000000000738A000-memory.dmp

          Filesize

          40KB

        • memory/2052-25-0x00000000057D0000-0x0000000005836000-memory.dmp

          Filesize

          408KB

        • memory/2052-58-0x00000000060B0000-0x00000000060FC000-memory.dmp

          Filesize

          304KB

        • memory/2052-15-0x0000000004A40000-0x0000000004A76000-memory.dmp

          Filesize

          216KB

        • memory/2052-16-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/2052-95-0x0000000007650000-0x000000000766A000-memory.dmp

          Filesize

          104KB

        • memory/2052-94-0x0000000007550000-0x0000000007564000-memory.dmp

          Filesize

          80KB

        • memory/2500-115-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2500-111-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2500-110-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/3340-27-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-35-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-153-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-152-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-145-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-64-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-144-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-137-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-136-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-62-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-61-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-129-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-59-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-60-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-28-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-128-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-126-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-123-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-56-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-122-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/3340-38-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-54-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-29-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/3340-121-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/3340-118-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/3496-102-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-96-0x0000000007730000-0x0000000007738000-memory.dmp

          Filesize

          32KB

        • memory/3496-26-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-76-0x0000000073090000-0x00000000730DC000-memory.dmp

          Filesize

          304KB

        • memory/3496-87-0x00000000070F0000-0x0000000007193000-memory.dmp

          Filesize

          652KB

        • memory/3496-89-0x0000000007400000-0x000000000741A000-memory.dmp

          Filesize

          104KB

        • memory/3496-88-0x0000000007AB0000-0x000000000812A000-memory.dmp

          Filesize

          6.5MB

        • memory/3496-92-0x0000000007610000-0x0000000007621000-memory.dmp

          Filesize

          68KB

        • memory/3496-20-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-93-0x0000000007640000-0x000000000764E000-memory.dmp

          Filesize

          56KB

        • memory/3496-21-0x00000000745C0000-0x0000000074D70000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-91-0x0000000007690000-0x0000000007726000-memory.dmp

          Filesize

          600KB

        • memory/4636-108-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4636-104-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/4636-106-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB