Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 22:57
Behavioral task
behavioral1
Sample
22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe
Resource
win7-20220901-en
General
-
Target
22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe
-
Size
963KB
-
MD5
0273045ad74e3b76dd75699fec3c80ac
-
SHA1
0b9b216306d63058604a2559b3b85a406691b3b0
-
SHA256
22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736
-
SHA512
82fe2bbd9c32ff25fd9549ff0b12396097863e12e426198ad62f06bb5d3255cd5b9a441f41ba134bad61bf3a6d51cafd5b263149a7afc001b4e76bb07165fe93
-
SSDEEP
24576:e1Z1xuVVjfFoynPaVBUR8f+kN10EBvSwveU/tVjnFlthy:ePQDgok30C5/thFlthy
Malware Config
Extracted
darkcomet
Guest16
68.230.210.107:1604
DC_MUTEX-SX36NMQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
6M4bKZJe7VmY
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" GWUAP.EXE -
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Executes dropped EXE 2 IoCs
pid Process 1404 GWUAP.EXE 728 msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1556 attrib.exe 1788 attrib.exe -
Loads dropped DLL 4 IoCs
pid Process 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 1404 GWUAP.EXE 1404 GWUAP.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" GWUAP.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe GWUAP.EXE File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe GWUAP.EXE File opened for modification C:\Windows\SysWOW64\MSDCSC\ GWUAP.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1404 GWUAP.EXE Token: SeSecurityPrivilege 1404 GWUAP.EXE Token: SeTakeOwnershipPrivilege 1404 GWUAP.EXE Token: SeLoadDriverPrivilege 1404 GWUAP.EXE Token: SeSystemProfilePrivilege 1404 GWUAP.EXE Token: SeSystemtimePrivilege 1404 GWUAP.EXE Token: SeProfSingleProcessPrivilege 1404 GWUAP.EXE Token: SeIncBasePriorityPrivilege 1404 GWUAP.EXE Token: SeCreatePagefilePrivilege 1404 GWUAP.EXE Token: SeBackupPrivilege 1404 GWUAP.EXE Token: SeRestorePrivilege 1404 GWUAP.EXE Token: SeShutdownPrivilege 1404 GWUAP.EXE Token: SeDebugPrivilege 1404 GWUAP.EXE Token: SeSystemEnvironmentPrivilege 1404 GWUAP.EXE Token: SeChangeNotifyPrivilege 1404 GWUAP.EXE Token: SeRemoteShutdownPrivilege 1404 GWUAP.EXE Token: SeUndockPrivilege 1404 GWUAP.EXE Token: SeManageVolumePrivilege 1404 GWUAP.EXE Token: SeImpersonatePrivilege 1404 GWUAP.EXE Token: SeCreateGlobalPrivilege 1404 GWUAP.EXE Token: 33 1404 GWUAP.EXE Token: 34 1404 GWUAP.EXE Token: 35 1404 GWUAP.EXE Token: SeIncreaseQuotaPrivilege 728 msdcsc.exe Token: SeSecurityPrivilege 728 msdcsc.exe Token: SeTakeOwnershipPrivilege 728 msdcsc.exe Token: SeLoadDriverPrivilege 728 msdcsc.exe Token: SeSystemProfilePrivilege 728 msdcsc.exe Token: SeSystemtimePrivilege 728 msdcsc.exe Token: SeProfSingleProcessPrivilege 728 msdcsc.exe Token: SeIncBasePriorityPrivilege 728 msdcsc.exe Token: SeCreatePagefilePrivilege 728 msdcsc.exe Token: SeBackupPrivilege 728 msdcsc.exe Token: SeRestorePrivilege 728 msdcsc.exe Token: SeShutdownPrivilege 728 msdcsc.exe Token: SeDebugPrivilege 728 msdcsc.exe Token: SeSystemEnvironmentPrivilege 728 msdcsc.exe Token: SeChangeNotifyPrivilege 728 msdcsc.exe Token: SeRemoteShutdownPrivilege 728 msdcsc.exe Token: SeUndockPrivilege 728 msdcsc.exe Token: SeManageVolumePrivilege 728 msdcsc.exe Token: SeImpersonatePrivilege 728 msdcsc.exe Token: SeCreateGlobalPrivilege 728 msdcsc.exe Token: 33 728 msdcsc.exe Token: 34 728 msdcsc.exe Token: 35 728 msdcsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 728 msdcsc.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1404 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 27 PID 1444 wrote to memory of 1404 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 27 PID 1444 wrote to memory of 1404 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 27 PID 1444 wrote to memory of 1404 1444 22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe 27 PID 1404 wrote to memory of 892 1404 GWUAP.EXE 29 PID 1404 wrote to memory of 892 1404 GWUAP.EXE 29 PID 1404 wrote to memory of 892 1404 GWUAP.EXE 29 PID 1404 wrote to memory of 892 1404 GWUAP.EXE 29 PID 1404 wrote to memory of 820 1404 GWUAP.EXE 30 PID 1404 wrote to memory of 820 1404 GWUAP.EXE 30 PID 1404 wrote to memory of 820 1404 GWUAP.EXE 30 PID 1404 wrote to memory of 820 1404 GWUAP.EXE 30 PID 892 wrote to memory of 1556 892 cmd.exe 33 PID 892 wrote to memory of 1556 892 cmd.exe 33 PID 892 wrote to memory of 1556 892 cmd.exe 33 PID 892 wrote to memory of 1556 892 cmd.exe 33 PID 820 wrote to memory of 1788 820 cmd.exe 34 PID 820 wrote to memory of 1788 820 cmd.exe 34 PID 820 wrote to memory of 1788 820 cmd.exe 34 PID 820 wrote to memory of 1788 820 cmd.exe 34 PID 1404 wrote to memory of 728 1404 GWUAP.EXE 35 PID 1404 wrote to memory of 728 1404 GWUAP.EXE 35 PID 1404 wrote to memory of 728 1404 GWUAP.EXE 35 PID 1404 wrote to memory of 728 1404 GWUAP.EXE 35 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 PID 728 wrote to memory of 2036 728 msdcsc.exe 36 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1556 attrib.exe 1788 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe"C:\Users\Admin\AppData\Local\Temp\22aa1e3289e416f53ab651dc468236516d3f005d3066a04f8c47fa9cd2511736.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\GWUAP.EXE"C:\Users\Admin\AppData\Local\Temp\GWUAP.EXE"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\GWUAP.EXE" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\GWUAP.EXE" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1788
-
-
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:2036
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
85KB
MD54190ea64214fef4e25f81428ef5b11a9
SHA160e92a633129d42743f822bf7039c773fe0db943
SHA256fcdbc3d1771b39da1dbc87816f2d510168c6ac7062e56ad5635eb4550c1021c3
SHA512dc50613caca329497bcb7d617ed09e9865a60ac96086f869a3196d1ee4cdb0c593492eec008521711bde0de47961ff2846c545a3c16ae79efd17bd527c382e62
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8
-
Filesize
658KB
MD5d7f382a357becb92fad459356bf125e3
SHA15d18bda457b297145d8156898f5be95ab38c0a4a
SHA25667b3abb3e5e6cfecad60a25a90b31cb697b89406413d6a442675aeb69ee80e73
SHA51246b05a0b5eabfdbcdd38eb5a2f3a11fe402467f71ce3027c5797e871e2d70618101bcb9a5bf9ef3ed46a2bd1d042a64c9dd555bd2360fdb6fbcdaff0683bfff8