Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe
-
Size
325KB
-
MD5
8b48a1b5a19cb1e67f43c81386fa26d0
-
SHA1
bb8d38a056d805d0f10fbdbe810f968ff3b9d184
-
SHA256
39b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
-
SHA512
361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
SSDEEP
6144:ZYgZdcJZs091uPFP1QpCT0LurJH1l3ZwzaKAG6cz9eswTfmr/yruO:ZY1JKIMlypCgiFJxlcz9eswT0hO
Malware Config
Extracted
darkcomet
WXXXXW
euro2012.no-ip.org:22
euro2012.no-ip.org:3389
euro2012.no-ip.org:5631
DC_MUTEX-X2H0E82
-
InstallPath
Debug\msdcsc.exe
-
gencode
F4JVWk9c0ekU
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\Debug\\msdcsc.exe" NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2824 attrib.exe 1964 attrib.exe -
Deletes itself 1 IoCs
pid Process 660 notepad.exe -
Executes dropped EXE 3 IoCs
pid Process 1992 msdcsc.exe 2356 msdcsc.exe 2192 msdcsc.exe -
Loads dropped DLL 1 IoCs
pid Process 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe -
resource yara_rule behavioral1/memory/1912-511-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2760-513-0x0000000000450000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1912-516-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1912-548-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2192-1070-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2192-1077-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\Debug\\msdcsc.exe" NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\Debug\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 msdcsc.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2640 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 2760 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 1992 msdcsc.exe 2356 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeSecurityPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeTakeOwnershipPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeLoadDriverPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeSystemProfilePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeSystemtimePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeProfSingleProcessPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeIncBasePriorityPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeCreatePagefilePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeBackupPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeRestorePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeShutdownPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeDebugPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeSystemEnvironmentPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeChangeNotifyPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeRemoteShutdownPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeUndockPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeManageVolumePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeImpersonatePrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeCreateGlobalPrivilege 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: 33 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: 34 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: 35 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe Token: SeIncreaseQuotaPrivilege 2192 msdcsc.exe Token: SeSecurityPrivilege 2192 msdcsc.exe Token: SeTakeOwnershipPrivilege 2192 msdcsc.exe Token: SeLoadDriverPrivilege 2192 msdcsc.exe Token: SeSystemProfilePrivilege 2192 msdcsc.exe Token: SeSystemtimePrivilege 2192 msdcsc.exe Token: SeProfSingleProcessPrivilege 2192 msdcsc.exe Token: SeIncBasePriorityPrivilege 2192 msdcsc.exe Token: SeCreatePagefilePrivilege 2192 msdcsc.exe Token: SeBackupPrivilege 2192 msdcsc.exe Token: SeRestorePrivilege 2192 msdcsc.exe Token: SeShutdownPrivilege 2192 msdcsc.exe Token: SeDebugPrivilege 2192 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2192 msdcsc.exe Token: SeChangeNotifyPrivilege 2192 msdcsc.exe Token: SeRemoteShutdownPrivilege 2192 msdcsc.exe Token: SeUndockPrivilege 2192 msdcsc.exe Token: SeManageVolumePrivilege 2192 msdcsc.exe Token: SeImpersonatePrivilege 2192 msdcsc.exe Token: SeCreateGlobalPrivilege 2192 msdcsc.exe Token: 33 2192 msdcsc.exe Token: 34 2192 msdcsc.exe Token: 35 2192 msdcsc.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2760 2640 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 29 PID 2640 wrote to memory of 2760 2640 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 29 PID 2640 wrote to memory of 2760 2640 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 29 PID 2640 wrote to memory of 2760 2640 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 29 PID 2760 wrote to memory of 1912 2760 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 30 PID 2760 wrote to memory of 1912 2760 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 30 PID 2760 wrote to memory of 1912 2760 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 30 PID 2760 wrote to memory of 1912 2760 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 30 PID 1912 wrote to memory of 1352 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 31 PID 1912 wrote to memory of 1352 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 31 PID 1912 wrote to memory of 1352 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 31 PID 1912 wrote to memory of 1352 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 31 PID 1912 wrote to memory of 880 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 32 PID 1912 wrote to memory of 880 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 32 PID 1912 wrote to memory of 880 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 32 PID 1912 wrote to memory of 880 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 32 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1352 wrote to memory of 2824 1352 cmd.exe 36 PID 1352 wrote to memory of 2824 1352 cmd.exe 36 PID 1352 wrote to memory of 2824 1352 cmd.exe 36 PID 1352 wrote to memory of 2824 1352 cmd.exe 36 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 880 wrote to memory of 1964 880 cmd.exe 37 PID 880 wrote to memory of 1964 880 cmd.exe 37 PID 880 wrote to memory of 1964 880 cmd.exe 37 PID 880 wrote to memory of 1964 880 cmd.exe 37 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 660 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 34 PID 1912 wrote to memory of 1992 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 38 PID 1912 wrote to memory of 1992 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 38 PID 1912 wrote to memory of 1992 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 38 PID 1912 wrote to memory of 1992 1912 NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe 38 PID 1992 wrote to memory of 2356 1992 msdcsc.exe 39 PID 1992 wrote to memory of 2356 1992 msdcsc.exe 39 PID 1992 wrote to memory of 2356 1992 msdcsc.exe 39 PID 1992 wrote to memory of 2356 1992 msdcsc.exe 39 PID 2356 wrote to memory of 2192 2356 msdcsc.exe 40 PID 2356 wrote to memory of 2192 2356 msdcsc.exe 40 PID 2356 wrote to memory of 2192 2356 msdcsc.exe 40 PID 2356 wrote to memory of 2192 2356 msdcsc.exe 40 PID 2192 wrote to memory of 2724 2192 msdcsc.exe 41 PID 2192 wrote to memory of 2724 2192 msdcsc.exe 41 PID 2192 wrote to memory of 2724 2192 msdcsc.exe 41 PID 2192 wrote to memory of 2724 2192 msdcsc.exe 41 PID 2192 wrote to memory of 2724 2192 msdcsc.exe 41 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2824 attrib.exe 1964 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe"3⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe" +s +h4⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\NEAS.8b48a1b5a19cb1e67f43c81386fa26d0.exe" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1964
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- Deletes itself
PID:660
-
-
C:\Users\Admin\Documents\Debug\msdcsc.exe"C:\Users\Admin\Documents\Debug\msdcsc.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\Documents\Debug\msdcsc.exe"C:\Users\Admin\Documents\Debug\msdcsc.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\Documents\Debug\msdcsc.exe"C:\Users\Admin\Documents\Debug\msdcsc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵PID:2724
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7
-
Filesize
325KB
MD58b48a1b5a19cb1e67f43c81386fa26d0
SHA1bb8d38a056d805d0f10fbdbe810f968ff3b9d184
SHA25639b902c7f2684b5faf01bb3872ddd4fd4066f15553e6b009a9be0fef85928b2c
SHA512361cac8ab1d20df90dd498c6cee0f0b0a8a1716b88a0ce437c48defe16c48e416bb3a4e75e97d659fe06d10c26d5dbc0b08a1146283265e8c1da6c744883c2e7