Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
Resource
win10v2004-20220812-en
General
-
Target
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe
-
Size
708KB
-
MD5
a136f80eebdb57bdebe406825c86d750
-
SHA1
83540c8b382854b67530efdca9bf46d649a8dc36
-
SHA256
09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
-
SHA512
0cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
SSDEEP
12288:wSS2Zdio6T+hWjxyNRh4gGJzEW0YQmvelqx2RgZM1/vXkHiBl3M:w72ZdoTKWj8NR+gGaW0YRv9x2R3v0CB
Malware Config
Extracted
darkcomet
Guest16
mafiausax.no-ip.org:1333
DC_MUTEX-0W6K1RW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
KaiNiaKuj5AE
-
install
true
-
offline_keylogger
true
-
password
0123456789
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 4988 explorer.exe 3916 msdcsc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\18.exe = "C:\\Users\\Admin\\AppData\\RoamingMicrosoft\\System\\Services\\18.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\18.exe = "C:\\Users\\Admin\\AppData\\RoamingMicrosoft\\System\\Services\\18.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4988 set thread context of 4932 4988 explorer.exe 82 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\MSDCSC\ vbc.exe File created C:\Windows\MSDCSC\msdcsc.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4932 vbc.exe Token: SeSecurityPrivilege 4932 vbc.exe Token: SeTakeOwnershipPrivilege 4932 vbc.exe Token: SeLoadDriverPrivilege 4932 vbc.exe Token: SeSystemProfilePrivilege 4932 vbc.exe Token: SeSystemtimePrivilege 4932 vbc.exe Token: SeProfSingleProcessPrivilege 4932 vbc.exe Token: SeIncBasePriorityPrivilege 4932 vbc.exe Token: SeCreatePagefilePrivilege 4932 vbc.exe Token: SeBackupPrivilege 4932 vbc.exe Token: SeRestorePrivilege 4932 vbc.exe Token: SeShutdownPrivilege 4932 vbc.exe Token: SeDebugPrivilege 4932 vbc.exe Token: SeSystemEnvironmentPrivilege 4932 vbc.exe Token: SeChangeNotifyPrivilege 4932 vbc.exe Token: SeRemoteShutdownPrivilege 4932 vbc.exe Token: SeUndockPrivilege 4932 vbc.exe Token: SeManageVolumePrivilege 4932 vbc.exe Token: SeImpersonatePrivilege 4932 vbc.exe Token: SeCreateGlobalPrivilege 4932 vbc.exe Token: 33 4932 vbc.exe Token: 34 4932 vbc.exe Token: 35 4932 vbc.exe Token: 36 4932 vbc.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4988 4236 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 81 PID 4236 wrote to memory of 4988 4236 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 81 PID 4236 wrote to memory of 4988 4236 09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe 81 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4988 wrote to memory of 4932 4988 explorer.exe 82 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 2076 4932 vbc.exe 84 PID 4932 wrote to memory of 3916 4932 vbc.exe 85 PID 4932 wrote to memory of 3916 4932 vbc.exe 85 PID 4932 wrote to memory of 3916 4932 vbc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe"C:\Users\Admin\AppData\Local\Temp\09f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:2076
-
-
C:\Windows\MSDCSC\msdcsc.exe"C:\Windows\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
PID:3916
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
708KB
MD5a136f80eebdb57bdebe406825c86d750
SHA183540c8b382854b67530efdca9bf46d649a8dc36
SHA25609f78205549095fa583201ea63d81cd5c8f2a7c65ff620c8dd251849d7093565
SHA5120cb287b3b5b7a7e086510d8d134fb8d497174f2f542a59e91cd63d77c6220b5be189774f8e1cbb5b7e7dc3a3635911182a435da263ee6910f1933a3791715589
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34