Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
44b34bbf9dd06a47250f20dc4e63aa00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44b34bbf9dd06a47250f20dc4e63aa00N.exe
Resource
win10v2004-20240709-en
General
-
Target
44b34bbf9dd06a47250f20dc4e63aa00N.exe
-
Size
520KB
-
MD5
44b34bbf9dd06a47250f20dc4e63aa00
-
SHA1
d283b44fd38a2e5c4580a1afb09e514b27228c3f
-
SHA256
2fc700b16c4a15b3732a2e7534f09e510692a5f445741011a50a786d806829b0
-
SHA512
170caef55f4633f6782d424e75a6f12e24935abedc749e60370c7d7a31c9b55663539fb156672a87e2bf53ce8b41f57c11228d1c655d7566538aa325b4fd0f92
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbs:f9fC3hh29Ya77A90aFtDfT5IMbs
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2824 winupd.exe 2596 winupd.exe 2768 winupd.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe -
resource yara_rule behavioral1/memory/2768-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-57-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-65-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-72-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-73-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-71-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-75-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-74-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-80-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-81-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-82-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-83-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-84-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-85-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-86-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-87-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-89-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2768-91-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\winupd.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3024 set thread context of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 2824 set thread context of 2596 2824 winupd.exe 32 PID 2824 set thread context of 2768 2824 winupd.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2660 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2248 reg.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2768 winupd.exe Token: SeSecurityPrivilege 2768 winupd.exe Token: SeTakeOwnershipPrivilege 2768 winupd.exe Token: SeLoadDriverPrivilege 2768 winupd.exe Token: SeSystemProfilePrivilege 2768 winupd.exe Token: SeSystemtimePrivilege 2768 winupd.exe Token: SeProfSingleProcessPrivilege 2768 winupd.exe Token: SeIncBasePriorityPrivilege 2768 winupd.exe Token: SeCreatePagefilePrivilege 2768 winupd.exe Token: SeBackupPrivilege 2768 winupd.exe Token: SeRestorePrivilege 2768 winupd.exe Token: SeShutdownPrivilege 2768 winupd.exe Token: SeDebugPrivilege 2768 winupd.exe Token: SeSystemEnvironmentPrivilege 2768 winupd.exe Token: SeChangeNotifyPrivilege 2768 winupd.exe Token: SeRemoteShutdownPrivilege 2768 winupd.exe Token: SeUndockPrivilege 2768 winupd.exe Token: SeManageVolumePrivilege 2768 winupd.exe Token: SeImpersonatePrivilege 2768 winupd.exe Token: SeCreateGlobalPrivilege 2768 winupd.exe Token: 33 2768 winupd.exe Token: 34 2768 winupd.exe Token: 35 2768 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 2824 winupd.exe 2596 winupd.exe 2768 winupd.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 3024 wrote to memory of 2888 3024 44b34bbf9dd06a47250f20dc4e63aa00N.exe 30 PID 2888 wrote to memory of 2824 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 31 PID 2888 wrote to memory of 2824 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 31 PID 2888 wrote to memory of 2824 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 31 PID 2888 wrote to memory of 2824 2888 44b34bbf9dd06a47250f20dc4e63aa00N.exe 31 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2596 2824 winupd.exe 32 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2824 wrote to memory of 2768 2824 winupd.exe 33 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2596 wrote to memory of 2660 2596 winupd.exe 34 PID 2660 wrote to memory of 1652 2660 ipconfig.exe 36 PID 2660 wrote to memory of 1652 2660 ipconfig.exe 36 PID 2660 wrote to memory of 1652 2660 ipconfig.exe 36 PID 2660 wrote to memory of 1652 2660 ipconfig.exe 36 PID 1652 wrote to memory of 2248 1652 cmd.exe 38 PID 1652 wrote to memory of 2248 1652 cmd.exe 38 PID 1652 wrote to memory of 2248 1652 cmd.exe 38 PID 1652 wrote to memory of 2248 1652 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b34bbf9dd06a47250f20dc4e63aa00N.exe"C:\Users\Admin\AppData\Local\Temp\44b34bbf9dd06a47250f20dc4e63aa00N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\44b34bbf9dd06a47250f20dc4e63aa00N.exe"C:\Users\Admin\AppData\Local\Temp\44b34bbf9dd06a47250f20dc4e63aa00N.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NGWFNBBC.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:2248
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5cac890d00365d07b9ca89def17cc3a36
SHA16fa99679ede791c16b5d3e6d243a98e8bbdb7eab
SHA2564f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da
SHA512124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1
-
Filesize
520KB
MD5c9afe151e7a1733d8d984cfcc35b03b6
SHA1afe499d52f63efd5f655fd564aa784edc9dfe91d
SHA25654026da544647c27879937004c86a8afe91c0d4d70330953ef73e6f3751fb783
SHA512da9e8caf6ce1273342f49e11de033dd9cc49d12a9c8cafb21b7119a30764273b9a1d0aa2043311852fcf378d96c105fc93b89d351fbff2bed59c60fa9fb077b5