Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 22:56 UTC
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
module.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
module.dll
Resource
win10v2004-20240802-en
General
-
Target
Launcher.exe
-
Size
1.0MB
-
MD5
389e49fd591fbdbe272575573a922085
-
SHA1
2145dacbed53f6b64ea96938cff8758531961c1a
-
SHA256
24191589d733c928bce4654a950c0f6bd02b6675a78e47e22893e72d27067264
-
SHA512
74b957d349a3241143525a6085372b8131551de3c1df25b61dc4fbbb74a868234cb36c32db14a61ab6eb516258a85d551956c408e20c0523eaa7e8e1d2b19bd4
-
SSDEEP
24576:82+IxnXZC4MQdHAsU/O552srSCbBJwNQEwTtaMmVL:uIByQhK/Og6BKNQkdl
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Launcher.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sys.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2336 sys.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 cmd.exe 2664 cmd.exe -
resource yara_rule behavioral1/memory/2748-0-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect behavioral1/memory/2748-9-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect behavioral1/memory/2748-21-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect behavioral1/files/0x0007000000015e25-23.dat vmprotect behavioral1/memory/2336-28-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect behavioral1/memory/2336-37-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect behavioral1/memory/2336-39-0x0000000000400000-0x0000000000603000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "\"C:\\Windows\\SysWOW64\\remcos\\sys.exe\"" Launcher.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "\"C:\\Windows\\SysWOW64\\remcos\\sys.exe\"" sys.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\remcos\sys.exe Launcher.exe File opened for modification C:\Windows\SysWOW64\remcos\sys.exe Launcher.exe File opened for modification C:\Windows\SysWOW64\remcos Launcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sys.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2632 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 Launcher.exe 2336 sys.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2748 wrote to memory of 2664 2748 Launcher.exe 30 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2632 2664 cmd.exe 32 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33 PID 2664 wrote to memory of 2336 2664 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
C:\Windows\SysWOW64\remcos\sys.exe"C:\Windows\SysWOW64\remcos\sys.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD5843fadf88dbddfc1a2d3c21e989a8e5a
SHA1c432ce68e04961580744b489daa452dc4d978a8d
SHA256f3b8a0dabf78adbb6b6b3664877a4622fc3624b6a513879a00057767a86880b9
SHA512e69b3334fe806ea17defb7eb6bfc4f8ca8186f12929cbbede3f563b900f38a2afcb2ef4045946b43c5e4cc682f24ddd158bfdfaf9f750cf00babd818fe7b090c
-
Filesize
1.0MB
MD5389e49fd591fbdbe272575573a922085
SHA12145dacbed53f6b64ea96938cff8758531961c1a
SHA25624191589d733c928bce4654a950c0f6bd02b6675a78e47e22893e72d27067264
SHA51274b957d349a3241143525a6085372b8131551de3c1df25b61dc4fbbb74a868234cb36c32db14a61ab6eb516258a85d551956c408e20c0523eaa7e8e1d2b19bd4