Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 02:44
Behavioral task
behavioral1
Sample
ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe
Resource
win7-20240903-en
General
-
Target
ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe
-
Size
756KB
-
MD5
13b62df776449fa84827a787990d2a63
-
SHA1
fb4cff98679a6d05a0216ff0adc33d7ab5c8eaed
-
SHA256
ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3
-
SHA512
eea02bacfeb10cde276a5d56818d4b6192be1068219bb4609ebf08fa2ab07e0b155e658bace9727a8487da19031718e1a43e5628137b8928e587079cc1157d71
-
SSDEEP
12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hxqMd0QZhI:KZ1xuVVjfFoynPaVBUR8f+kN10EBDD0j
Malware Config
Extracted
darkcomet
Guest16
hellboy19.no-ip.info:1604
DC_MUTEX-TQ7JFPB
-
gencode
ziQAGtNCwdK8
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeSecurityPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeTakeOwnershipPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeLoadDriverPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeSystemProfilePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeSystemtimePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeProfSingleProcessPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeIncBasePriorityPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeCreatePagefilePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeBackupPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeRestorePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeShutdownPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeDebugPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeSystemEnvironmentPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeChangeNotifyPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeRemoteShutdownPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeUndockPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeManageVolumePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeImpersonatePrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: SeCreateGlobalPrivilege 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: 33 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: 34 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe Token: 35 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe"C:\Users\Admin\AppData\Local\Temp\ce3c5086d712c03a0318b29a6d91489482b8c5235d88fd4fbb4c42e632e78ec3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2980