Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
1d818c67cd7b934a84588a3207b2e50a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d818c67cd7b934a84588a3207b2e50a.exe
Resource
win10v2004-20240802-en
General
-
Target
1d818c67cd7b934a84588a3207b2e50a.exe
-
Size
879KB
-
MD5
1d818c67cd7b934a84588a3207b2e50a
-
SHA1
f143719dafea314eb6ae638e9a7694da54c3a445
-
SHA256
932c8687387b5fa94ef7b5c11358b0d0dc90ea488729382e09ec126d61457d6d
-
SHA512
41e68271ed5c52427c1e9953bc3ac9c0562541a186a6a44712602dd88968fdd2d896f3c56dccc39dac512c9885e0eb9c194d26f148ce484418b001d1bf60401e
-
SSDEEP
24576:Ovd+fC6BjsHpE+dOj+18tyAgajKCzMlTyFjSIi0/:O1+a6NsHp3MlhOGM1mO0/
Malware Config
Extracted
remcos
RemoteHost
www.c42staging.com:2404
www.vdoclabs.com:2404
www.ozkol-aluminyum.com:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
dfghj
-
mouse_option
false
-
mutex
Rmc-QCH1J0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4848 powershell.exe 2076 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 1d818c67cd7b934a84588a3207b2e50a.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 536 set thread context of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d818c67cd7b934a84588a3207b2e50a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 536 1d818c67cd7b934a84588a3207b2e50a.exe 4848 powershell.exe 536 1d818c67cd7b934a84588a3207b2e50a.exe 2076 powershell.exe 4848 powershell.exe 2076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 536 1d818c67cd7b934a84588a3207b2e50a.exe Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1452 vbc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 536 wrote to memory of 4848 536 1d818c67cd7b934a84588a3207b2e50a.exe 84 PID 536 wrote to memory of 4848 536 1d818c67cd7b934a84588a3207b2e50a.exe 84 PID 536 wrote to memory of 4848 536 1d818c67cd7b934a84588a3207b2e50a.exe 84 PID 536 wrote to memory of 2076 536 1d818c67cd7b934a84588a3207b2e50a.exe 86 PID 536 wrote to memory of 2076 536 1d818c67cd7b934a84588a3207b2e50a.exe 86 PID 536 wrote to memory of 2076 536 1d818c67cd7b934a84588a3207b2e50a.exe 86 PID 536 wrote to memory of 1740 536 1d818c67cd7b934a84588a3207b2e50a.exe 88 PID 536 wrote to memory of 1740 536 1d818c67cd7b934a84588a3207b2e50a.exe 88 PID 536 wrote to memory of 1740 536 1d818c67cd7b934a84588a3207b2e50a.exe 88 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90 PID 536 wrote to memory of 1452 536 1d818c67cd7b934a84588a3207b2e50a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d818c67cd7b934a84588a3207b2e50a.exe"C:\Users\Admin\AppData\Local\Temp\1d818c67cd7b934a84588a3207b2e50a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1d818c67cd7b934a84588a3207b2e50a.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wTTruYPumnUe.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wTTruYPumnUe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEB1B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD50a1a0df29df39b142256974ad10d589d
SHA17276437f1f91dfc73fc9e141b848d2556fe2009f
SHA256d15de8a63755f3b419bf15f4b511664cfee217b14d2a0cc67522d36d88650c9b
SHA512da9019a68f20a4afbfc54fb61d9d3663cef9191ee26ecbac1955cd9ddb7258539b424f1b38c9603c9db6b875c4039b94fae6707987a2d8544891d293db56b30c
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5cffeb726176e7a62462f13697e957930
SHA1d2184a3a8d9053100e2a05509c2c8075b44b0c18
SHA2565da639c3f9aa4592f758dd8411ff72eea76773e61ee150f84da8cf3e1be68625
SHA5120120cddf333c82e05c7a28dfe2f710e947bdfdf07642838f294162a751707db393092216846a53a9bcd412eb3cd109cf65b0cc51ae96f732ec7d0ce0fef231d9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5a35c9021bd72bfa7816014a5bf73bb9f
SHA11a201bf52f28c7ced971706c9f19202c31524886
SHA256960c09c2a7f8d37be98447c31cde430aa292f0091b421c04c0aa1188ea9c1490
SHA512be8ec3c1e31e7d3f3604d8299f82d80b8a542c569289c41fa64a3bfd4aa59987b278e8e8d81fc0a09c8fd3e49b9cb883756258c28503b58dfe92e5c8489ac5b2