Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe
Resource
win10v2004-20220812-en
General
-
Target
841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe
-
Size
522KB
-
MD5
9dfb07602ea0746b21957d2610ed52d9
-
SHA1
1114f93efba5d9992ad8b71363db60b24e219b6c
-
SHA256
841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05
-
SHA512
b6a646ab82e4910e818aa07525264f2548a17c42837ca3cdb871627ee4ac840501d8afa2f2c62e1ad24d06babe11cd87ab4fa8e7e373ff9590fbb9ea6f6ea464
-
SSDEEP
12288:V5yqq4mBet9eHsgfZpj1+F2l+5IThMHChFOI1Ar0JE/ZkVSGZpU:bmW9ZSlIgl+5ITSChNaoJER
Malware Config
Extracted
darkcomet
Lalx
vxqpok2983.ddns.net:1604
DC_MUTEX-3HK5ZXQ
-
gencode
vKh92RY4kw3H
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\hZzNRuWMon\\pmrIFVKAmG.exe,explorer.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe Token: SeIncreaseQuotaPrivilege 220 AppLaunch.exe Token: SeSecurityPrivilege 220 AppLaunch.exe Token: SeTakeOwnershipPrivilege 220 AppLaunch.exe Token: SeLoadDriverPrivilege 220 AppLaunch.exe Token: SeSystemProfilePrivilege 220 AppLaunch.exe Token: SeSystemtimePrivilege 220 AppLaunch.exe Token: SeProfSingleProcessPrivilege 220 AppLaunch.exe Token: SeIncBasePriorityPrivilege 220 AppLaunch.exe Token: SeCreatePagefilePrivilege 220 AppLaunch.exe Token: SeBackupPrivilege 220 AppLaunch.exe Token: SeRestorePrivilege 220 AppLaunch.exe Token: SeShutdownPrivilege 220 AppLaunch.exe Token: SeDebugPrivilege 220 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 220 AppLaunch.exe Token: SeChangeNotifyPrivilege 220 AppLaunch.exe Token: SeRemoteShutdownPrivilege 220 AppLaunch.exe Token: SeUndockPrivilege 220 AppLaunch.exe Token: SeManageVolumePrivilege 220 AppLaunch.exe Token: SeImpersonatePrivilege 220 AppLaunch.exe Token: SeCreateGlobalPrivilege 220 AppLaunch.exe Token: 33 220 AppLaunch.exe Token: 34 220 AppLaunch.exe Token: 35 220 AppLaunch.exe Token: 36 220 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 220 AppLaunch.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1584 wrote to memory of 540 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 85 PID 1584 wrote to memory of 540 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 85 PID 1584 wrote to memory of 540 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 85 PID 540 wrote to memory of 2776 540 cmd.exe 87 PID 540 wrote to memory of 2776 540 cmd.exe 87 PID 540 wrote to memory of 2776 540 cmd.exe 87 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88 PID 1584 wrote to memory of 220 1584 841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe"C:\Users\Admin\AppData\Local\Temp\841262726e83cc2a62b2c0d523426bcb6a38829b033a6530ec3e76b6521ebe05.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\hZzNRuWMon\pmrIFVKAmG.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\hZzNRuWMon\pmrIFVKAmG.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:2776
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:220
-