Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
COTIZACIONSyCONSULTA#46789NOV24.bat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
COTIZACIONSyCONSULTA#46789NOV24.bat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Hypermyotonia/Selvskyldnerkautioners166.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Hypermyotonia/Selvskyldnerkautioners166.ps1
Resource
win10v2004-20241007-en
General
-
Target
COTIZACIONSyCONSULTA#46789NOV24.bat.exe
-
Size
696KB
-
MD5
9481aae46f5f383c4cf6e5b3dacd68b4
-
SHA1
580a6fc8fb6c6609cfcd356e9894cdb5318135ee
-
SHA256
857596f38c587a4a832bdd9136cc593ab7073ca3bda87b513e4e13ee31af0a32
-
SHA512
ecc96befec7561eb4e5320f22f48d6fb0ddf837a8ba1eee6b823a80ff81b874f8553ef83001612d31d7a3b4a441e1fed2664ed40e10c72efca8e95a0da1c0b90
-
SSDEEP
12288:z8bn1Tfr3YmR1j+uP30YcUbA3pPru8escoGcZhAkFN2ZTyWy0ctqhm2V7P:zun1XdRV+u/Lcj3pusccAgN2ZT1HI2VD
Malware Config
Extracted
remcos
SLAVES
windowslavesclient.duckdns.org:1604
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-J3MJAP
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4312-86-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2260-83-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/5092-82-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2260-83-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4312-86-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3780 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 17 4784 msiexec.exe 28 4784 msiexec.exe 33 4784 msiexec.exe 34 4784 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4784 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3780 powershell.exe 4784 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4784 set thread context of 4312 4784 msiexec.exe 103 PID 4784 set thread context of 2260 4784 msiexec.exe 104 PID 4784 set thread context of 5092 4784 msiexec.exe 105 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\resources\afskibes.lnk COTIZACIONSyCONSULTA#46789NOV24.bat.exe File opened for modification C:\Windows\resources\0409\unedged\staveres.Del137 COTIZACIONSyCONSULTA#46789NOV24.bat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COTIZACIONSyCONSULTA#46789NOV24.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 5092 msiexec.exe 5092 msiexec.exe 4312 msiexec.exe 4312 msiexec.exe 4312 msiexec.exe 4312 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3780 powershell.exe 4784 msiexec.exe 4784 msiexec.exe 4784 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3780 powershell.exe Token: SeIncreaseQuotaPrivilege 3780 powershell.exe Token: SeSecurityPrivilege 3780 powershell.exe Token: SeTakeOwnershipPrivilege 3780 powershell.exe Token: SeLoadDriverPrivilege 3780 powershell.exe Token: SeSystemProfilePrivilege 3780 powershell.exe Token: SeSystemtimePrivilege 3780 powershell.exe Token: SeProfSingleProcessPrivilege 3780 powershell.exe Token: SeIncBasePriorityPrivilege 3780 powershell.exe Token: SeCreatePagefilePrivilege 3780 powershell.exe Token: SeBackupPrivilege 3780 powershell.exe Token: SeRestorePrivilege 3780 powershell.exe Token: SeShutdownPrivilege 3780 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeSystemEnvironmentPrivilege 3780 powershell.exe Token: SeRemoteShutdownPrivilege 3780 powershell.exe Token: SeUndockPrivilege 3780 powershell.exe Token: SeManageVolumePrivilege 3780 powershell.exe Token: 33 3780 powershell.exe Token: 34 3780 powershell.exe Token: 35 3780 powershell.exe Token: 36 3780 powershell.exe Token: SeDebugPrivilege 5092 msiexec.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3780 4680 COTIZACIONSyCONSULTA#46789NOV24.bat.exe 85 PID 4680 wrote to memory of 3780 4680 COTIZACIONSyCONSULTA#46789NOV24.bat.exe 85 PID 4680 wrote to memory of 3780 4680 COTIZACIONSyCONSULTA#46789NOV24.bat.exe 85 PID 3780 wrote to memory of 4784 3780 powershell.exe 98 PID 3780 wrote to memory of 4784 3780 powershell.exe 98 PID 3780 wrote to memory of 4784 3780 powershell.exe 98 PID 3780 wrote to memory of 4784 3780 powershell.exe 98 PID 4784 wrote to memory of 4312 4784 msiexec.exe 103 PID 4784 wrote to memory of 4312 4784 msiexec.exe 103 PID 4784 wrote to memory of 4312 4784 msiexec.exe 103 PID 4784 wrote to memory of 4312 4784 msiexec.exe 103 PID 4784 wrote to memory of 2260 4784 msiexec.exe 104 PID 4784 wrote to memory of 2260 4784 msiexec.exe 104 PID 4784 wrote to memory of 2260 4784 msiexec.exe 104 PID 4784 wrote to memory of 2260 4784 msiexec.exe 104 PID 4784 wrote to memory of 5092 4784 msiexec.exe 105 PID 4784 wrote to memory of 5092 4784 msiexec.exe 105 PID 4784 wrote to memory of 5092 4784 msiexec.exe 105 PID 4784 wrote to memory of 5092 4784 msiexec.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\COTIZACIONSyCONSULTA#46789NOV24.bat.exe"C:\Users\Admin\AppData\Local\Temp\COTIZACIONSyCONSULTA#46789NOV24.bat.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Rgerrighed=Get-Content -raw 'C:\Users\Admin\AppData\Local\idiograph\pseudocultural\Digitised194\Hypermyotonia\Selvskyldnerkautioners166.Ove';$Kropsvisitationerne=$Rgerrighed.SubString(55510,3);.$Kropsvisitationerne($Rgerrighed)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\fcwbtlwf"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qebmtdhgicjq"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\syheuwsawkbvmrp"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD560a0bdc1cf495566ff810105d728af4a
SHA1243403c535f37a1f3d5f307fc3fb8bdd5cbcf6e6
SHA256fd12da9f9b031f9fa742fa73bbb2c9265f84f49069b7c503e512427b93bce6d2
SHA5124445f214dbf5a01d703f22a848b56866f3f37b399de503f99d40448dc86459bf49d1fa487231f23c080a559017d72bcd9f6c13562e1f0bd53c1c9a89e73306a5
-
C:\Users\Admin\AppData\Local\idiograph\pseudocultural\Digitised194\Hypermyotonia\Selvskyldnerkautioners166.Ove
Filesize54KB
MD5dc17cbe567137cd2180d5d9008408c1b
SHA1f6d6cb48deacb371ae5e948b614216411a957b8a
SHA256a39ec711eead243210ca0061a2b0365b86f40b5114a4a17286960a36c668053d
SHA51264bf594a0cee26fbdfafac1d552a7ab4dedbc566fa58d4af1c3bc22a6d11814e0511daed2cb8725b7d3c0a91765a980b2ebc4836c09fad159282db01edb64833
-
Filesize
286KB
MD5d70569c20b50458964208f39851c03b9
SHA17f636f64924a61f6142e2781cba016a1f8a4c031
SHA256c9f4d56807a02fd5f68868b28a745030c4faf370fbadca218cce69839de7ca73
SHA512a56591ce7003ee5546ba02de2c791653e58f30aab8e86bce6827486b0b043c69339b6899357c92e48cc6b5226acd0d9e9067be2a380d9f521d635256501aac80