Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 00:49 UTC

General

  • Target

    e05f7b8e28e8f66bcf8c2285fb5a7418.exe

  • Size

    4.2MB

  • MD5

    e05f7b8e28e8f66bcf8c2285fb5a7418

  • SHA1

    7ecf8fb1f0b66cb822ffdb95c5af26a22a8f21ca

  • SHA256

    dca15b06df096c0c64040541b93cb082d36da00301e593df1e84c9c4c3755e4e

  • SHA512

    93f420af76dcac8cfb2478bf00c2540486f5fb7bd4cb10920be3bcab6f1656fbe9c433a0936492ba0e9dfe97b54a4b9ba58fcf1b2d8d3e6a7743902c15489804

  • SSDEEP

    24576:g8FD4Ib+69Q8VHHA3sE2CognHHdndjsmB/MOs9jqHL2+i+KFYQyNW8HFSGYcXHX0:vzvK8V56H9dt/imVlXc5

Score
10/10

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e05f7b8e28e8f66bcf8c2285fb5a7418.exe
    "C:\Users\Admin\AppData\Local\Temp\e05f7b8e28e8f66bcf8c2285fb5a7418.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:2736
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Checks BIOS information in registry
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2044

    Network

    • flag-us
      DNS
      dz9.no-ip.info
      vbc.exe
      Remote address:
      8.8.8.8:53
      Request
      dz9.no-ip.info
      IN A
      Response
    No results found
    • 8.8.8.8:53
      dz9.no-ip.info
      dns
      vbc.exe
      60 B
      120 B
      1
      1

      DNS Request

      dz9.no-ip.info

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2044-15-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-13-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-45-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-3-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-5-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-11-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-9-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-21-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-44-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-24-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-26-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2044-29-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-28-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-27-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-25-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-22-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2044-17-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-43-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-42-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-7-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-30-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-31-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-32-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-33-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-34-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-35-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-36-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-37-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-38-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-39-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-40-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2044-41-0x0000000000400000-0x00000000004D9000-memory.dmp

      Filesize

      868KB

    • memory/2964-0-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2964-1-0x0000000002510000-0x0000000002550000-memory.dmp

      Filesize

      256KB

    • memory/2964-23-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    • memory/2964-2-0x0000000074D50000-0x00000000752FB000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.