Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
Resource
win10v2004-20220812-en
General
-
Target
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
-
Size
708KB
-
MD5
a136f80eebdb57bdebe406825c86d750
-
SHA1
83540c8b382854b67530efdca9bf46d649a8dc36
-
SHA256
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
-
SHA512
0cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
SSDEEP
12288:wSS2Zdio6T+hWjxyNRh4gGJzEW0YQmvelqx2RgZM1/vXkHiBl3M:w72ZdoTKWj8NR+gGaW0YRv9x2R3v0CB
Malware Config
Extracted
darkcomet
Guest16
mafiausax.no-ip.org:1333
DC_MUTEX-0W6K1RW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
KaiNiaKuj5AE
-
install
true
-
offline_keylogger
true
-
password
0123456789
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 1728 explorer.exe 1488 msdcsc.exe -
Loads dropped DLL 3 IoCs
pid Process 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 2040 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\18.exe = "C:\\Users\\Admin\\AppData\\RoamingMicrosoft\\System\\Services\\18.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18.exe = "C:\\Users\\Admin\\AppData\\RoamingMicrosoft\\System\\Services\\18.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 2040 1728 explorer.exe 28 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\MSDCSC\ vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2040 vbc.exe Token: SeSecurityPrivilege 2040 vbc.exe Token: SeTakeOwnershipPrivilege 2040 vbc.exe Token: SeLoadDriverPrivilege 2040 vbc.exe Token: SeSystemProfilePrivilege 2040 vbc.exe Token: SeSystemtimePrivilege 2040 vbc.exe Token: SeProfSingleProcessPrivilege 2040 vbc.exe Token: SeIncBasePriorityPrivilege 2040 vbc.exe Token: SeCreatePagefilePrivilege 2040 vbc.exe Token: SeBackupPrivilege 2040 vbc.exe Token: SeRestorePrivilege 2040 vbc.exe Token: SeShutdownPrivilege 2040 vbc.exe Token: SeDebugPrivilege 2040 vbc.exe Token: SeSystemEnvironmentPrivilege 2040 vbc.exe Token: SeChangeNotifyPrivilege 2040 vbc.exe Token: SeRemoteShutdownPrivilege 2040 vbc.exe Token: SeUndockPrivilege 2040 vbc.exe Token: SeManageVolumePrivilege 2040 vbc.exe Token: SeImpersonatePrivilege 2040 vbc.exe Token: SeCreateGlobalPrivilege 2040 vbc.exe Token: 33 2040 vbc.exe Token: 34 2040 vbc.exe Token: 35 2040 vbc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1728 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 27 PID 1840 wrote to memory of 1728 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 27 PID 1840 wrote to memory of 1728 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 27 PID 1840 wrote to memory of 1728 1840 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 27 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 1728 wrote to memory of 2040 1728 explorer.exe 28 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 828 2040 vbc.exe 29 PID 2040 wrote to memory of 1488 2040 vbc.exe 30 PID 2040 wrote to memory of 1488 2040 vbc.exe 30 PID 2040 wrote to memory of 1488 2040 vbc.exe 30 PID 2040 wrote to memory of 1488 2040 vbc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe"C:\Users\Admin\AppData\Local\Temp\09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:828
-
-
C:\Windows\MSDCSC\msdcsc.exe"C:\Windows\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
PID:1488
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98