Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
0988986.exe
Resource
win7-20240708-en
General
-
Target
0988986.exe
-
Size
897KB
-
MD5
00cb16ec61346dc7a4410acbb683a6f2
-
SHA1
d4c2741a51aef320c23e66221741bdbfbda9ddea
-
SHA256
1c251b2a58b7c9c19bca9f5eb75fa7cd93a73fe07e34c1759a2381dda79ffda4
-
SHA512
e33736dcb7e553bfdfc708c948413630496befdc9fc4bf5a83e42cea93ea400624379aeca984636b066c7d2377a524ce00112215c68a9dd6b4bdd9aba845ed9d
-
SSDEEP
24576:qgEceydzP4Nj+x/SZ/Jk9R9Hq9AfQaz/smsNqGxDeI:qVkjmK9R9K9Af7sN3
Malware Config
Extracted
remcos
mekus
dpm-sael.com:2017
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
meckus-ODY51K
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1852 powershell.exe 1432 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 0988986.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 4996 2648 0988986.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0988986.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0988986.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1432 powershell.exe 1432 powershell.exe 1852 powershell.exe 1852 powershell.exe 1852 powershell.exe 1432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4996 0988986.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1852 2648 0988986.exe 97 PID 2648 wrote to memory of 1852 2648 0988986.exe 97 PID 2648 wrote to memory of 1852 2648 0988986.exe 97 PID 2648 wrote to memory of 1432 2648 0988986.exe 99 PID 2648 wrote to memory of 1432 2648 0988986.exe 99 PID 2648 wrote to memory of 1432 2648 0988986.exe 99 PID 2648 wrote to memory of 5036 2648 0988986.exe 101 PID 2648 wrote to memory of 5036 2648 0988986.exe 101 PID 2648 wrote to memory of 5036 2648 0988986.exe 101 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103 PID 2648 wrote to memory of 4996 2648 0988986.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0988986.exe"C:\Users\Admin\AppData\Local\Temp\0988986.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0988986.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jcXOqLBJLRu.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jcXOqLBJLRu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8632.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\0988986.exe"C:\Users\Admin\AppData\Local\Temp\0988986.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3824,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:81⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD55ac50cf6fc165d719a1d5f76fbfd7f7b
SHA1b423e401cee351500e575f84f575b10cefb490d3
SHA256a8378decec63a37633af70caa08d26168589f8e7001a021bdda9f1f27539d5c6
SHA512dc51099e1a36d89bc377e46e8f06c93284aeb7468bd44786328802c43dcca9bfec2c19b942c7673cc2183edf378f173f8fd9b1db9305af64cb6fffb95fa9d07a
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5df2e59caa4136ad5e370bf4fae54e50a
SHA180563b9eeaecf38b8e0e18cc699756a2cc33b261
SHA256ce024962a13b9adb0124f645e35d1191b536aafcf276d2e0846e6e255ad862dd
SHA5120be4eb556f7535116c0cc84ecc7978bd83b3e527476babde23ece4aa746a86a85e24f829d26efbf4391a53f328509622a0e8a2e6f94c97c216baebd2cc7f3866
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5cc2c8fb21352e1fd3cacf4a8abb46782
SHA1f5287f206470aa409f223108484b8f1af600a263
SHA256eebeebd91cf95d41846eedb347ebd03407f7291c80ad35666d8ed26b17bfaca1
SHA51299a4e85a10feabe1eec608bd32670b9754b77303812152c5d0ad8d6a6624ad0119f34fb2bc8585686b23e1b897f4d08c40a134c11dfdcdd6773542c70ece6d7b