Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe
Resource
win7-20240903-en
General
-
Target
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe
-
Size
1.0MB
-
MD5
e17eb3edf1a499f7c5c4db9b108fdd52
-
SHA1
7c5ced6fd3f90862ee2b99594db7f82e2f27c631
-
SHA256
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3
-
SHA512
9f99c43a60d864d80dabc01844458490800c83bd1293315f61368b2444a6a1c006eff277853276067baa2dea8cd807b9d5f676550144bd3b7fe4e8be70c1f06d
-
SSDEEP
24576:LuDXTIGaPhEYzUzA0p5GHZKLveFKNhEaj2S0Fv:CDjlabwz9p5GHZKLVjE5
Malware Config
Extracted
darkcomet
Guest16
10.0.2.15:1609
DC_MUTEX-P0JRNS5
-
gencode
wYoGsyz7YM05
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Document_9.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Document_9.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 212 attrib.exe 4804 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Document_9.exe -
Executes dropped EXE 1 IoCs
pid Process 1916 Document_9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document_9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1916 Document_9.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1916 Document_9.exe Token: SeSecurityPrivilege 1916 Document_9.exe Token: SeTakeOwnershipPrivilege 1916 Document_9.exe Token: SeLoadDriverPrivilege 1916 Document_9.exe Token: SeSystemProfilePrivilege 1916 Document_9.exe Token: SeSystemtimePrivilege 1916 Document_9.exe Token: SeProfSingleProcessPrivilege 1916 Document_9.exe Token: SeIncBasePriorityPrivilege 1916 Document_9.exe Token: SeCreatePagefilePrivilege 1916 Document_9.exe Token: SeBackupPrivilege 1916 Document_9.exe Token: SeRestorePrivilege 1916 Document_9.exe Token: SeShutdownPrivilege 1916 Document_9.exe Token: SeDebugPrivilege 1916 Document_9.exe Token: SeSystemEnvironmentPrivilege 1916 Document_9.exe Token: SeChangeNotifyPrivilege 1916 Document_9.exe Token: SeRemoteShutdownPrivilege 1916 Document_9.exe Token: SeUndockPrivilege 1916 Document_9.exe Token: SeManageVolumePrivilege 1916 Document_9.exe Token: SeImpersonatePrivilege 1916 Document_9.exe Token: SeCreateGlobalPrivilege 1916 Document_9.exe Token: 33 1916 Document_9.exe Token: 34 1916 Document_9.exe Token: 35 1916 Document_9.exe Token: 36 1916 Document_9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1916 Document_9.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1916 1716 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 85 PID 1716 wrote to memory of 1916 1716 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 85 PID 1716 wrote to memory of 1916 1716 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 85 PID 1916 wrote to memory of 1892 1916 Document_9.exe 88 PID 1916 wrote to memory of 1892 1916 Document_9.exe 88 PID 1916 wrote to memory of 1892 1916 Document_9.exe 88 PID 1916 wrote to memory of 2612 1916 Document_9.exe 90 PID 1916 wrote to memory of 2612 1916 Document_9.exe 90 PID 1916 wrote to memory of 2612 1916 Document_9.exe 90 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1916 wrote to memory of 4580 1916 Document_9.exe 91 PID 1892 wrote to memory of 212 1892 cmd.exe 93 PID 1892 wrote to memory of 212 1892 cmd.exe 93 PID 1892 wrote to memory of 212 1892 cmd.exe 93 PID 2612 wrote to memory of 4804 2612 cmd.exe 94 PID 2612 wrote to memory of 4804 2612 cmd.exe 94 PID 2612 wrote to memory of 4804 2612 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4804 attrib.exe 212 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe"C:\Users\Admin\AppData\Local\Temp\28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe"2⤵
- Modifies security service
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4804
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5f55924b6e77ced8d2502b2a3f54874da
SHA1c5e0c5e41aa5a58472d3f0260e2eae2f222a36c4
SHA2564b4bb0d6e309a1ebe80a5e6fc8c500ec766aaf4031c9c956de31e080c0da931d
SHA512be332b98cc4390fdcbd5d4cabdfbb5767b8b683eedbb42f7e9170c01301312e51654862ee79ba519fa7600cfbedd9346386682974d00f96b370052df76e0e98d