Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 09:22 UTC

General

  • Target

    b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe

  • Size

    520KB

  • MD5

    74b0b03fff3d28b89f0e8027d8142530

  • SHA1

    4c8d197f26635b263ac7200b9d0c8283b1d07351

  • SHA256

    b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893

  • SHA512

    0922391e521f1b656230016382a2a684c9cbe96f45a5a291c99b93ee508c4d9344423c1144b37a968db94fa96ddc14213a16c2926c6f12c32dd59d87d9227856

  • SSDEEP

    6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbQ:f9fC3hh29Ya77A90aFtDfT5IMbQ

Malware Config

Extracted

Family

darkcomet

Botnet

PrivateEye

C2

ratblackshades.no-ip.biz:1604

Mutex

DC_MUTEX-ACC1R98

Attributes
  • gencode

    8GG5LVVGljSF

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe
    "C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe
      "C:\Users\Admin\AppData\Local\Temp\b8f9e6fd17dec2e0a2569c79965f3127370089bd48c3f20871b5c79430060893N.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\ipconfig.exe
            "C:\Windows\system32\ipconfig.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\FSORUTVH.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinUpdate /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:588
        • C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2860

Network

  • flag-us
    DNS
    ratblackshades.no-ip.biz
    winupd.exe
    Remote address:
    8.8.8.8:53
    Request
    ratblackshades.no-ip.biz
    IN A
    Response
No results found
  • 8.8.8.8:53
    ratblackshades.no-ip.biz
    dns
    winupd.exe
    70 B
    130 B
    1
    1

    DNS Request

    ratblackshades.no-ip.biz

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FSORUTVH.bat

    Filesize

    151B

    MD5

    cac890d00365d07b9ca89def17cc3a36

    SHA1

    6fa99679ede791c16b5d3e6d243a98e8bbdb7eab

    SHA256

    4f98ddee89760080a5c8a93666d2f5c97be52b741265ef4d1ce9aaebf05f12da

    SHA512

    124dc0b18e13425bde43bcbbe2a99005928e398bffcb458d498aac9e754bc5b92b703270667800876c60b0801343f2de8c6b9a1eebafd80bb4f6d5dc295dd9f1

  • \Users\Admin\AppData\Roaming\Microsoft\winupd.exe

    Filesize

    520KB

    MD5

    16c8d4882873f4d60288b13811cfa7fe

    SHA1

    1fe04060d2cceedb52bf5d9c9dde12850c6706ba

    SHA256

    cc5225fd410812fcb3e98504646ae34596a853ce2935d1c60bd7bfb28d8c1b0a

    SHA512

    218b46be7c517908591bc5cdc4e6adcc6cc336c8857cf17062846689570d82ccd06ec05f3803ec3393aadd2d407a245bc4d814d4ef04e611e450a5c00686bdb6

  • memory/1636-14-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1636-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1636-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1636-6-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1636-4-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1636-71-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2688-73-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2760-81-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2760-68-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2840-64-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2840-62-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2840-42-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2840-48-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2860-78-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-79-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-63-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-76-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-61-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-58-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-54-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-52-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-50-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-94-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-72-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-93-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-77-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-75-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-92-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-91-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-83-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-84-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-85-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-86-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-87-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-88-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-89-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-90-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3052-3-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3052-18-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3052-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3052-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.