Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2c1342e5adcb48ed2484432124aaf890.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2c1342e5adcb48ed2484432124aaf890.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2c1342e5adcb48ed2484432124aaf890.exe
-
Size
332KB
-
MD5
2c1342e5adcb48ed2484432124aaf890
-
SHA1
4f3b9bf5206dfe906d51fb647792bcdd96168d14
-
SHA256
704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
-
SHA512
cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e
-
SSDEEP
6144:kYLtU7Ixhnhz5qLZWBRyve1+HxhV+baign+kuEEEnBa:zsI3lQK71870baign+kRtnI
Malware Config
Extracted
darkcomet
Guest16
h1kt.zapto.org:443
DC_MUTEX-37C19AC
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
DfluA4s3mqmR
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" NEAS.2c1342e5adcb48ed2484432124aaf890.exe -
Deletes itself 1 IoCs
pid Process 2452 notepad.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" NEAS.2c1342e5adcb48ed2484432124aaf890.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeSecurityPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeTakeOwnershipPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeLoadDriverPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeSystemProfilePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeSystemtimePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeProfSingleProcessPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeIncBasePriorityPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeCreatePagefilePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeBackupPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeRestorePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeShutdownPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeDebugPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeSystemEnvironmentPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeChangeNotifyPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeRemoteShutdownPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeUndockPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeManageVolumePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeImpersonatePrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeCreateGlobalPrivilege 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: 33 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: 34 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: 35 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe Token: SeIncreaseQuotaPrivilege 2624 msdcsc.exe Token: SeSecurityPrivilege 2624 msdcsc.exe Token: SeTakeOwnershipPrivilege 2624 msdcsc.exe Token: SeLoadDriverPrivilege 2624 msdcsc.exe Token: SeSystemProfilePrivilege 2624 msdcsc.exe Token: SeSystemtimePrivilege 2624 msdcsc.exe Token: SeProfSingleProcessPrivilege 2624 msdcsc.exe Token: SeIncBasePriorityPrivilege 2624 msdcsc.exe Token: SeCreatePagefilePrivilege 2624 msdcsc.exe Token: SeBackupPrivilege 2624 msdcsc.exe Token: SeRestorePrivilege 2624 msdcsc.exe Token: SeShutdownPrivilege 2624 msdcsc.exe Token: SeDebugPrivilege 2624 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2624 msdcsc.exe Token: SeChangeNotifyPrivilege 2624 msdcsc.exe Token: SeRemoteShutdownPrivilege 2624 msdcsc.exe Token: SeUndockPrivilege 2624 msdcsc.exe Token: SeManageVolumePrivilege 2624 msdcsc.exe Token: SeImpersonatePrivilege 2624 msdcsc.exe Token: SeCreateGlobalPrivilege 2624 msdcsc.exe Token: 33 2624 msdcsc.exe Token: 34 2624 msdcsc.exe Token: 35 2624 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 msdcsc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2452 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 28 PID 3044 wrote to memory of 2624 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 29 PID 3044 wrote to memory of 2624 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 29 PID 3044 wrote to memory of 2624 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 29 PID 3044 wrote to memory of 2624 3044 NEAS.2c1342e5adcb48ed2484432124aaf890.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2c1342e5adcb48ed2484432124aaf890.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2c1342e5adcb48ed2484432124aaf890.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
PID:2452
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD52c1342e5adcb48ed2484432124aaf890
SHA14f3b9bf5206dfe906d51fb647792bcdd96168d14
SHA256704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
SHA512cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e
-
Filesize
332KB
MD52c1342e5adcb48ed2484432124aaf890
SHA14f3b9bf5206dfe906d51fb647792bcdd96168d14
SHA256704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
SHA512cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e
-
Filesize
332KB
MD52c1342e5adcb48ed2484432124aaf890
SHA14f3b9bf5206dfe906d51fb647792bcdd96168d14
SHA256704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
SHA512cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e
-
Filesize
332KB
MD52c1342e5adcb48ed2484432124aaf890
SHA14f3b9bf5206dfe906d51fb647792bcdd96168d14
SHA256704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
SHA512cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e
-
Filesize
332KB
MD52c1342e5adcb48ed2484432124aaf890
SHA14f3b9bf5206dfe906d51fb647792bcdd96168d14
SHA256704aa90daaa9ee5af371f6e8a818b93002ce33351046cf13a3c1970e8f15e799
SHA512cb743ee3d357ae2eb5c6adc7b5f304c7c09d831aae3a8a69565cc8d0707f4e47a34e2ab606a333f8a4159f866026f8d8f76ead7baf5ece38d81ee7ec48337c8e