Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/02/2025, 07:14 UTC

250205-h2tr1awkfv 10

01/10/2022, 23:39 UTC

221001-3nca1scbd8 10

Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2022, 23:39 UTC

General

  • Target

    9fa6c7d1c6e03a0eb892319ee48c8510f91c43b5056aa7b76ee134ccb3d0ef87.exe

  • Size

    283KB

  • MD5

    6cbb584e6702fa8e374732b363466ef0

  • SHA1

    3065c8a2b41475609465c35a63c5957d6297071d

  • SHA256

    9fa6c7d1c6e03a0eb892319ee48c8510f91c43b5056aa7b76ee134ccb3d0ef87

  • SHA512

    8e599fe8183611c714aea83019ec24f283dbe0fe8a54c8e644cdb4246edc50ec0e8de7799a2c2b4bbc30670c8762855e6ff93e6bb8775d71c2ff0df0de89edb3

  • SSDEEP

    6144:9cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37VB:9cW7KEZlPzCy37VB

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

whatrobloxhackedrobuxlastnight.ddns.net:1604

Mutex

DC_MUTEX-XABL0YQ

Attributes
  • InstallPath

    Alx

  • gencode

    nuMr7zMe6ooH

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    Alx

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fa6c7d1c6e03a0eb892319ee48c8510f91c43b5056aa7b76ee134ccb3d0ef87.exe
    "C:\Users\Admin\AppData\Local\Temp\9fa6c7d1c6e03a0eb892319ee48c8510f91c43b5056aa7b76ee134ccb3d0ef87.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:4716

Network

    No results found
  • 13.89.179.8:443
    322 B
    7
  • 87.248.202.1:80
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4716-132-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

  • memory/4716-133-0x0000000000400000-0x00000000004C7000-memory.dmp

    Filesize

    796KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.