Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe
Resource
win10v2004-20220901-en
General
-
Target
4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe
-
Size
720KB
-
MD5
f5ec22b04ff24ba717ef4f7c567f8e52
-
SHA1
51bd7372c4f9d1b90f43d0f5d1d080bda770d043
-
SHA256
4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248
-
SHA512
0e5f67c8f45cf5c304fb7fc1601174a036d86fde6fdfee7d0efd2616d690fc6bd7fbafcd64ba749c9fe874eb31235bb161b9fd02bb63c550e0cd090f25ce9512
-
SSDEEP
12288:jrgXPhw9xGblYKJPa2dILqneS4+oVOcb9hd8qOFINneXFXgIv5VhmkQWNMf:4XOu9HIL9XOcb9hdNOFINeXb00Ne
Malware Config
Extracted
darkcomet
silk
chinahacking.zapto.org:1509
DC_MUTEX-KGBE2JX
-
gencode
BqtloSbbcP1S
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.pif 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\help.exe" 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeSecurityPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeTakeOwnershipPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeLoadDriverPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeSystemProfilePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeSystemtimePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeProfSingleProcessPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeIncBasePriorityPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeCreatePagefilePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeBackupPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeRestorePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeShutdownPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeDebugPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeSystemEnvironmentPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeChangeNotifyPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeRemoteShutdownPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeUndockPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeManageVolumePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeImpersonatePrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: SeCreateGlobalPrivilege 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: 33 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: 34 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe Token: 35 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 636 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1984 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 28 PID 2028 wrote to memory of 1984 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 28 PID 2028 wrote to memory of 1984 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 28 PID 2028 wrote to memory of 1984 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 28 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 1984 wrote to memory of 596 1984 cmd.exe 31 PID 1984 wrote to memory of 596 1984 cmd.exe 31 PID 1984 wrote to memory of 596 1984 cmd.exe 31 PID 1984 wrote to memory of 596 1984 cmd.exe 31 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 2028 wrote to memory of 636 2028 4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe 29 PID 596 wrote to memory of 1392 596 net.exe 32 PID 596 wrote to memory of 1392 596 net.exe 32 PID 596 wrote to memory of 1392 596 net.exe 32 PID 596 wrote to memory of 1392 596 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe"C:\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exeC:\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe
Filesize720KB
MD5f5ec22b04ff24ba717ef4f7c567f8e52
SHA151bd7372c4f9d1b90f43d0f5d1d080bda770d043
SHA2564a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248
SHA5120e5f67c8f45cf5c304fb7fc1601174a036d86fde6fdfee7d0efd2616d690fc6bd7fbafcd64ba749c9fe874eb31235bb161b9fd02bb63c550e0cd090f25ce9512
-
\Users\Admin\AppData\Local\Temp\4a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248.exe
Filesize720KB
MD5f5ec22b04ff24ba717ef4f7c567f8e52
SHA151bd7372c4f9d1b90f43d0f5d1d080bda770d043
SHA2564a798faf015bbbc263a0de880c66c5ddd858d9daa75876474cea18ca8ed3c248
SHA5120e5f67c8f45cf5c304fb7fc1601174a036d86fde6fdfee7d0efd2616d690fc6bd7fbafcd64ba749c9fe874eb31235bb161b9fd02bb63c550e0cd090f25ce9512