Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    311s
  • max time network
    325s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:00

General

  • Target

    c2bc9d90cf7c07e8a7fbf0e95ee6f2f498bf7013af1244b56bbec2710a62447c.exe

  • Size

    986KB

  • MD5

    e4589bdd4373f16a69e4920cbc073027

  • SHA1

    f0ebc47a2aeff4b011b83fc259add79269e9088a

  • SHA256

    c2bc9d90cf7c07e8a7fbf0e95ee6f2f498bf7013af1244b56bbec2710a62447c

  • SHA512

    1df8da02951c320883ce91c5bf2ba562ebfee8cd8b7b620f7654c8f6d9d1a5ce1d7f8118de2cf766ce452803db0df13a6ee270f393e0237b0c610565a1e34442

  • SSDEEP

    12288:iaAchpWsuVtDnBsBDJIcynnC90levX4CuYf2D82T3s99+VHuN9oSd:zAEE3uBDhynCylQgi63O9+VuNt

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2bc9d90cf7c07e8a7fbf0e95ee6f2f498bf7013af1244b56bbec2710a62447c.exe
    "C:\Users\Admin\AppData\Local\Temp\c2bc9d90cf7c07e8a7fbf0e95ee6f2f498bf7013af1244b56bbec2710a62447c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4876-132-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB

  • memory/4876-133-0x0000000000400000-0x00000000004F8000-memory.dmp

    Filesize

    992KB