Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
7467600344ecd69e3b51b02ff361c880.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7467600344ecd69e3b51b02ff361c880.exe
Resource
win10v2004-20231222-en
General
-
Target
7467600344ecd69e3b51b02ff361c880.exe
-
Size
1.9MB
-
MD5
7467600344ecd69e3b51b02ff361c880
-
SHA1
aca0a966cc25accdb18db700be03ed8aa7d2b4b2
-
SHA256
9d5a84fe325937581908b7795d4953678d709d7317de7da4e9c0736a3e0ff513
-
SHA512
d7d2eb85d715ce4276f4b1fced95727ff9615b5cbc87790de5b63b426cc42b9ffe451b373962a21cd2ccfc4aa78ac3e8870f16f1dc945424642920b1ecab6053
-
SSDEEP
49152:/JZoQrbTFZY1iaY61p3Faa3swyymhOzFv+p8YL6fjzMVrs1Ko0AZWZ:/trbTA1TBWtGLiYiV
Malware Config
Extracted
darkcomet
Guest16
davidcz.no-ip.org:1604
DC_MUTEX-76KHYQT
-
gencode
EiNiCx44oAXb
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7467600344ecd69e3b51b02ff361c880.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7467600344ecd69e3b51b02ff361c880.exe" 7467600344ecd69e3b51b02ff361c880.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1540 set thread context of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 832 taskmgr.exe Token: SeSecurityPrivilege 832 taskmgr.exe Token: SeTakeOwnershipPrivilege 832 taskmgr.exe Token: SeLoadDriverPrivilege 832 taskmgr.exe Token: SeSystemProfilePrivilege 832 taskmgr.exe Token: SeSystemtimePrivilege 832 taskmgr.exe Token: SeProfSingleProcessPrivilege 832 taskmgr.exe Token: SeIncBasePriorityPrivilege 832 taskmgr.exe Token: SeCreatePagefilePrivilege 832 taskmgr.exe Token: SeBackupPrivilege 832 taskmgr.exe Token: SeRestorePrivilege 832 taskmgr.exe Token: SeShutdownPrivilege 832 taskmgr.exe Token: SeDebugPrivilege 832 taskmgr.exe Token: SeSystemEnvironmentPrivilege 832 taskmgr.exe Token: SeChangeNotifyPrivilege 832 taskmgr.exe Token: SeRemoteShutdownPrivilege 832 taskmgr.exe Token: SeUndockPrivilege 832 taskmgr.exe Token: SeManageVolumePrivilege 832 taskmgr.exe Token: SeImpersonatePrivilege 832 taskmgr.exe Token: SeCreateGlobalPrivilege 832 taskmgr.exe Token: 33 832 taskmgr.exe Token: 34 832 taskmgr.exe Token: 35 832 taskmgr.exe Token: 36 832 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 832 taskmgr.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1540 wrote to memory of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94 PID 1540 wrote to memory of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94 PID 1540 wrote to memory of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94 PID 1540 wrote to memory of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94 PID 1540 wrote to memory of 832 1540 7467600344ecd69e3b51b02ff361c880.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7467600344ecd69e3b51b02ff361c880.exe"C:\Users\Admin\AppData\Local\Temp\7467600344ecd69e3b51b02ff361c880.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\system32\taskmgr.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:832
-