Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
74a9f7ac76250c6eb9d0c674a4249c92.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74a9f7ac76250c6eb9d0c674a4249c92.exe
Resource
win10v2004-20231215-en
General
-
Target
74a9f7ac76250c6eb9d0c674a4249c92.exe
-
Size
426KB
-
MD5
74a9f7ac76250c6eb9d0c674a4249c92
-
SHA1
8c544f4df935bbb9c13e8c88359497f134e47abd
-
SHA256
45f13c2ef9560816343176cce689c89e8a1fcd48e021b71093b56d19cb3c947b
-
SHA512
e4476f5c1792f9361ee5f53968b3f1abbd8b012c3f0cc47580565a54b5b41d12edb29aa0cd4fbe5e08e7d20a1175b891c37e58fa908aa5737c84cbb8bbdb2d25
-
SSDEEP
12288:6Tij6aV7gcz/cWCrR46sYjtyW3Ydi7N0+u21j6c769k:66lNcWCtpsYjtyOwgF1OK6W
Malware Config
Extracted
darkcomet
Guest16
basel1234.no-ip.biz:81
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
LSspVhv0MBT2
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 74a9f7ac76250c6eb9d0c674a4249c92.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 74a9f7ac76250c6eb9d0c674a4249c92.exe -
Executes dropped EXE 2 IoCs
pid Process 1572 msdcsc.exe 4492 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 74a9f7ac76250c6eb9d0c674a4249c92.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5044 set thread context of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 1572 set thread context of 4492 1572 msdcsc.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 74a9f7ac76250c6eb9d0c674a4249c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 74a9f7ac76250c6eb9d0c674a4249c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeSecurityPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeTakeOwnershipPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeLoadDriverPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeSystemProfilePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeSystemtimePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeProfSingleProcessPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeIncBasePriorityPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeCreatePagefilePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeBackupPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeRestorePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeShutdownPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeDebugPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeSystemEnvironmentPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeChangeNotifyPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeRemoteShutdownPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeUndockPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeManageVolumePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeImpersonatePrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeCreateGlobalPrivilege 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: 33 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: 34 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: 35 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: 36 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe Token: SeIncreaseQuotaPrivilege 4492 msdcsc.exe Token: SeSecurityPrivilege 4492 msdcsc.exe Token: SeTakeOwnershipPrivilege 4492 msdcsc.exe Token: SeLoadDriverPrivilege 4492 msdcsc.exe Token: SeSystemProfilePrivilege 4492 msdcsc.exe Token: SeSystemtimePrivilege 4492 msdcsc.exe Token: SeProfSingleProcessPrivilege 4492 msdcsc.exe Token: SeIncBasePriorityPrivilege 4492 msdcsc.exe Token: SeCreatePagefilePrivilege 4492 msdcsc.exe Token: SeBackupPrivilege 4492 msdcsc.exe Token: SeRestorePrivilege 4492 msdcsc.exe Token: SeShutdownPrivilege 4492 msdcsc.exe Token: SeDebugPrivilege 4492 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4492 msdcsc.exe Token: SeChangeNotifyPrivilege 4492 msdcsc.exe Token: SeRemoteShutdownPrivilege 4492 msdcsc.exe Token: SeUndockPrivilege 4492 msdcsc.exe Token: SeManageVolumePrivilege 4492 msdcsc.exe Token: SeImpersonatePrivilege 4492 msdcsc.exe Token: SeCreateGlobalPrivilege 4492 msdcsc.exe Token: 33 4492 msdcsc.exe Token: 34 4492 msdcsc.exe Token: 35 4492 msdcsc.exe Token: 36 4492 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 1572 msdcsc.exe 4492 msdcsc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 5044 wrote to memory of 1376 5044 74a9f7ac76250c6eb9d0c674a4249c92.exe 88 PID 1376 wrote to memory of 1572 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe 89 PID 1376 wrote to memory of 1572 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe 89 PID 1376 wrote to memory of 1572 1376 74a9f7ac76250c6eb9d0c674a4249c92.exe 89 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90 PID 1572 wrote to memory of 4492 1572 msdcsc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe"C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exeC:\Users\Admin\AppData\Local\Temp\74a9f7ac76250c6eb9d0c674a4249c92.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5e3f9a509e634ca19dca10f9fca557487
SHA1c0eb5a11164b46dfb22cd9ff40e8450dcc598e07
SHA256608c82bb91e08ce281318c5d8c37d639a175f7b2e1005e3e5fa88e76bf397d4c
SHA512fc37c3660cf739d06df2f7b3aabaf450c0ca267c74d1cdfac18d59ca4bdb638db310a94ea20827891cacd87c3a5c013331a53c921827399bf9849046297f63ec
-
Filesize
373KB
MD5638edd96eee2b0329395478356a06e07
SHA1071f675638ae5b4e90e7b00a6713b35ef6d96b2c
SHA256ecd204067450c4f59f1daa9ef660e679cade9074474222f48c50f78b7c48d4b0
SHA512bfd84a00f47ed6f3216216665c1d627a7f335e0ae59c3697a66ce917704f3ce20498df8d0c36242403bbe401431e17de98f7d189e59f0f2011ceac60b267cbd1
-
Filesize
426KB
MD574a9f7ac76250c6eb9d0c674a4249c92
SHA18c544f4df935bbb9c13e8c88359497f134e47abd
SHA25645f13c2ef9560816343176cce689c89e8a1fcd48e021b71093b56d19cb3c947b
SHA512e4476f5c1792f9361ee5f53968b3f1abbd8b012c3f0cc47580565a54b5b41d12edb29aa0cd4fbe5e08e7d20a1175b891c37e58fa908aa5737c84cbb8bbdb2d25