Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe
Resource
win10v2004-20220812-en
General
-
Target
12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe
-
Size
2.1MB
-
MD5
06666b8c365f725fce6c099c63aa2342
-
SHA1
30f5e6c2566ccf5fb5f7bcfe8e8bc0bcd4352b3b
-
SHA256
12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99
-
SHA512
b1ecfa68a162255b6042272399b008b275034553ddba137fcb1378fdfb08fe254a420d83b30e24ab6505f29e6343f3909fd6499c0f2ad7721ee29e92094eee7f
-
SSDEEP
49152:+kwkn9IMHea1xjBkMGXsgR+PS4+F7x7maPCS:NdnVdxNkMGXtKEx7VPC
Malware Config
Extracted
darkcomet
ddddyyy
daynasmithx.ddns.net:100
DCMIN_MUTEX-UGTM8YB
-
InstallPath
DCSCMIN\explorer.exe
-
gencode
vhfpLUSAnw3d
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
explorer.exe
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe" 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28 PID 2028 wrote to memory of 328 2028 12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe"C:\Users\Admin\AppData\Local\Temp\12b0f55ad1876e48ccffa02bff9255e705a072755902c5bedef5a87e7993eb99.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"2⤵PID:328
-
C:\Users\Admin\Documents\DCSCMIN\explorer.exe"C:\Users\Admin\Documents\DCSCMIN\explorer.exe"3⤵PID:764
-
-