Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
281s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
18V4860 TS Light Diesel.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
18V4860 TS Light Diesel.exe
Resource
win10v2004-20240802-en
General
-
Target
18V4860 TS Light Diesel.exe
-
Size
881KB
-
MD5
88ad99bd08e94b721914d8368c3a259b
-
SHA1
8d6518f2ea260d9835c3ed7190808fc263ed010a
-
SHA256
4cce5506593907c3db78282849ed41729ca7cf737e1d38cb82dc10e27d92ff16
-
SHA512
9dece9766da615b5b5b72c1d8167f7c3f54a73d3cc95a024e6b541e7c6c278606d9e8fdba37102cb251ed227a16780630033a6e8dcee9acc075fd417bb8c3e54
-
SSDEEP
24576:qQ/EymH4hro8jGqj56ulEJ8v+FgFOfY823:3yHGrhGqdFlECv+CX
Malware Config
Extracted
remcos
RemoteHost
www.drechftankholding.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
dfgh
-
mouse_option
false
-
mutex
Rmc-8J6PG9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2140-72-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1308-68-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/2408-67-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1308-68-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2408-67-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2564 powershell.exe 2592 powershell.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2308 set thread context of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 3036 set thread context of 2408 3036 vbc.exe 40 PID 3036 set thread context of 1308 3036 vbc.exe 41 PID 3036 set thread context of 2140 3036 vbc.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18V4860 TS Light Diesel.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2308 18V4860 TS Light Diesel.exe 2308 18V4860 TS Light Diesel.exe 2592 powershell.exe 2564 powershell.exe 2408 vbc.exe 2408 vbc.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3036 vbc.exe 3036 vbc.exe 3036 vbc.exe 3036 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2308 18V4860 TS Light Diesel.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2140 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3036 vbc.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2564 2308 18V4860 TS Light Diesel.exe 31 PID 2308 wrote to memory of 2564 2308 18V4860 TS Light Diesel.exe 31 PID 2308 wrote to memory of 2564 2308 18V4860 TS Light Diesel.exe 31 PID 2308 wrote to memory of 2564 2308 18V4860 TS Light Diesel.exe 31 PID 2308 wrote to memory of 2592 2308 18V4860 TS Light Diesel.exe 33 PID 2308 wrote to memory of 2592 2308 18V4860 TS Light Diesel.exe 33 PID 2308 wrote to memory of 2592 2308 18V4860 TS Light Diesel.exe 33 PID 2308 wrote to memory of 2592 2308 18V4860 TS Light Diesel.exe 33 PID 2308 wrote to memory of 2732 2308 18V4860 TS Light Diesel.exe 35 PID 2308 wrote to memory of 2732 2308 18V4860 TS Light Diesel.exe 35 PID 2308 wrote to memory of 2732 2308 18V4860 TS Light Diesel.exe 35 PID 2308 wrote to memory of 2732 2308 18V4860 TS Light Diesel.exe 35 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 2308 wrote to memory of 3036 2308 18V4860 TS Light Diesel.exe 37 PID 3036 wrote to memory of 1908 3036 vbc.exe 39 PID 3036 wrote to memory of 1908 3036 vbc.exe 39 PID 3036 wrote to memory of 1908 3036 vbc.exe 39 PID 3036 wrote to memory of 1908 3036 vbc.exe 39 PID 3036 wrote to memory of 2408 3036 vbc.exe 40 PID 3036 wrote to memory of 2408 3036 vbc.exe 40 PID 3036 wrote to memory of 2408 3036 vbc.exe 40 PID 3036 wrote to memory of 2408 3036 vbc.exe 40 PID 3036 wrote to memory of 2408 3036 vbc.exe 40 PID 3036 wrote to memory of 1308 3036 vbc.exe 41 PID 3036 wrote to memory of 1308 3036 vbc.exe 41 PID 3036 wrote to memory of 1308 3036 vbc.exe 41 PID 3036 wrote to memory of 1308 3036 vbc.exe 41 PID 3036 wrote to memory of 1308 3036 vbc.exe 41 PID 3036 wrote to memory of 2140 3036 vbc.exe 42 PID 3036 wrote to memory of 2140 3036 vbc.exe 42 PID 3036 wrote to memory of 2140 3036 vbc.exe 42 PID 3036 wrote to memory of 2140 3036 vbc.exe 42 PID 3036 wrote to memory of 2140 3036 vbc.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\18V4860 TS Light Diesel.exe"C:\Users\Admin\AppData\Local\Temp\18V4860 TS Light Diesel.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\18V4860 TS Light Diesel.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PNLFWPpnxTlxjH.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PNLFWPpnxTlxjH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20BA.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\tkxbamdbhqshmgj"3⤵PID:1908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\tkxbamdbhqshmgj"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\dmcubfovvykuwmxzbe"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\gghecxzwjgcyyatckoyqs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD56000dc78702b4e7f6b5d47c9535151d0
SHA1959e32d88512e1b786bbdd0316d8e1a28610a55a
SHA256e607d6b0b6d6d0c3ed815bfbf86234f53c7027f93fa005c15806593775332a66
SHA5120b5d1fbcf2eb7ad1ee58ee3775d3685023f7701d0626f565f1bbd73494dadbc67612ce7a7c939491686945e26c6a198902c2b883d0a878ea2582301f0b7932db
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD578d0751c7aae4b65a285d9633e87b747
SHA1621e2452af37dff3c45739e586b70ffef9dd090b
SHA25620175f0fefff0335ecb1a2868cb8a79631b98b2665f81e0fa7b01d6dcac119dd
SHA5123056d72064c80501be73b4494e267a1cb67e973c88bbf5629a29671575c94ccb996547f4d856bc35d69aaa2f816a0f2c340c5152a946fa30f7fd8ef1e0e8a6b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZRSK58161QD03CQ7V3VE.temp
Filesize7KB
MD507d1586935b54e4c4f25a9671dbfc747
SHA1dddf0c801c211dd9ee0a8584fa5b62de1d8f8ee9
SHA2563f6bd98b3fd2e672f891dcde8bdd96022edccc38f0a4c8c0139f93df6b99da43
SHA51215d32eeb5a666810b5a06fb0a3d168b32c2c2ba100f471bab1e59cc71ce6e8b9390c5289a54de5c0113a13786ec119a4ce3abc8006cedb4b54774fdb10417791