Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 03:45
Behavioral task
behavioral1
Sample
yooooooooooooooooooooooooooo.exe
Resource
win7-20240903-en
General
-
Target
yooooooooooooooooooooooooooo.exe
-
Size
658KB
-
MD5
16970261ab090fc0df7e9124f9758d5c
-
SHA1
04316b859eaa6b0894c5eb749a618ddc86d31ea5
-
SHA256
8ecb10af9238d2b7b2739d8294d2d817e1c90e801787b39c353f24e955d7889d
-
SHA512
31096688a7b24636eb39d21660a40749d26783ed90c279647bbb29a04bc2548bda9fe08a6f9d2de9a41802db3c9f3693fb68c6ddeb8daa3bf8b0ceb52578ec4c
-
SSDEEP
12288:y9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hV:eZ1xuVVjfFoynPaVBUR8f+kN10EBD
Malware Config
Extracted
darkcomet
Guest16_min
181.215.176.83:1604
DCMIN_MUTEX-36BW6A0
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
6NrT9l1sLVPo
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" yooooooooooooooooooooooooooo.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 IMDCSC.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 yooooooooooooooooooooooooooo.exe 2100 yooooooooooooooooooooooooooo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" yooooooooooooooooooooooooooo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yooooooooooooooooooooooooooo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMDCSC.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeSecurityPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeTakeOwnershipPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeLoadDriverPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeSystemProfilePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeSystemtimePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeProfSingleProcessPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeIncBasePriorityPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeCreatePagefilePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeBackupPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeRestorePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeShutdownPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeDebugPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeSystemEnvironmentPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeChangeNotifyPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeRemoteShutdownPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeUndockPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeManageVolumePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeImpersonatePrivilege 2100 yooooooooooooooooooooooooooo.exe Token: SeCreateGlobalPrivilege 2100 yooooooooooooooooooooooooooo.exe Token: 33 2100 yooooooooooooooooooooooooooo.exe Token: 34 2100 yooooooooooooooooooooooooooo.exe Token: 35 2100 yooooooooooooooooooooooooooo.exe Token: SeIncreaseQuotaPrivilege 1732 IMDCSC.exe Token: SeSecurityPrivilege 1732 IMDCSC.exe Token: SeTakeOwnershipPrivilege 1732 IMDCSC.exe Token: SeLoadDriverPrivilege 1732 IMDCSC.exe Token: SeSystemProfilePrivilege 1732 IMDCSC.exe Token: SeSystemtimePrivilege 1732 IMDCSC.exe Token: SeProfSingleProcessPrivilege 1732 IMDCSC.exe Token: SeIncBasePriorityPrivilege 1732 IMDCSC.exe Token: SeCreatePagefilePrivilege 1732 IMDCSC.exe Token: SeBackupPrivilege 1732 IMDCSC.exe Token: SeRestorePrivilege 1732 IMDCSC.exe Token: SeShutdownPrivilege 1732 IMDCSC.exe Token: SeDebugPrivilege 1732 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 1732 IMDCSC.exe Token: SeChangeNotifyPrivilege 1732 IMDCSC.exe Token: SeRemoteShutdownPrivilege 1732 IMDCSC.exe Token: SeUndockPrivilege 1732 IMDCSC.exe Token: SeManageVolumePrivilege 1732 IMDCSC.exe Token: SeImpersonatePrivilege 1732 IMDCSC.exe Token: SeCreateGlobalPrivilege 1732 IMDCSC.exe Token: 33 1732 IMDCSC.exe Token: 34 1732 IMDCSC.exe Token: 35 1732 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 IMDCSC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1732 2100 yooooooooooooooooooooooooooo.exe 31 PID 2100 wrote to memory of 1732 2100 yooooooooooooooooooooooooooo.exe 31 PID 2100 wrote to memory of 1732 2100 yooooooooooooooooooooooooooo.exe 31 PID 2100 wrote to memory of 1732 2100 yooooooooooooooooooooooooooo.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\yooooooooooooooooooooooooooo.exe"C:\Users\Admin\AppData\Local\Temp\yooooooooooooooooooooooooooo.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD516970261ab090fc0df7e9124f9758d5c
SHA104316b859eaa6b0894c5eb749a618ddc86d31ea5
SHA2568ecb10af9238d2b7b2739d8294d2d817e1c90e801787b39c353f24e955d7889d
SHA51231096688a7b24636eb39d21660a40749d26783ed90c279647bbb29a04bc2548bda9fe08a6f9d2de9a41802db3c9f3693fb68c6ddeb8daa3bf8b0ceb52578ec4c