Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe
Resource
win7-20240903-en
General
-
Target
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe
-
Size
1.0MB
-
MD5
e17eb3edf1a499f7c5c4db9b108fdd52
-
SHA1
7c5ced6fd3f90862ee2b99594db7f82e2f27c631
-
SHA256
28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3
-
SHA512
9f99c43a60d864d80dabc01844458490800c83bd1293315f61368b2444a6a1c006eff277853276067baa2dea8cd807b9d5f676550144bd3b7fe4e8be70c1f06d
-
SSDEEP
24576:LuDXTIGaPhEYzUzA0p5GHZKLveFKNhEaj2S0Fv:CDjlabwz9p5GHZKLVjE5
Malware Config
Extracted
darkcomet
Guest16
10.0.2.15:1609
DC_MUTEX-P0JRNS5
-
gencode
wYoGsyz7YM05
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Document_9.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Document_9.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2904 attrib.exe 2636 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Document_9.exe -
Executes dropped EXE 1 IoCs
pid Process 4388 Document_9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document_9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4388 Document_9.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4388 Document_9.exe Token: SeSecurityPrivilege 4388 Document_9.exe Token: SeTakeOwnershipPrivilege 4388 Document_9.exe Token: SeLoadDriverPrivilege 4388 Document_9.exe Token: SeSystemProfilePrivilege 4388 Document_9.exe Token: SeSystemtimePrivilege 4388 Document_9.exe Token: SeProfSingleProcessPrivilege 4388 Document_9.exe Token: SeIncBasePriorityPrivilege 4388 Document_9.exe Token: SeCreatePagefilePrivilege 4388 Document_9.exe Token: SeBackupPrivilege 4388 Document_9.exe Token: SeRestorePrivilege 4388 Document_9.exe Token: SeShutdownPrivilege 4388 Document_9.exe Token: SeDebugPrivilege 4388 Document_9.exe Token: SeSystemEnvironmentPrivilege 4388 Document_9.exe Token: SeChangeNotifyPrivilege 4388 Document_9.exe Token: SeRemoteShutdownPrivilege 4388 Document_9.exe Token: SeUndockPrivilege 4388 Document_9.exe Token: SeManageVolumePrivilege 4388 Document_9.exe Token: SeImpersonatePrivilege 4388 Document_9.exe Token: SeCreateGlobalPrivilege 4388 Document_9.exe Token: 33 4388 Document_9.exe Token: 34 4388 Document_9.exe Token: 35 4388 Document_9.exe Token: 36 4388 Document_9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4388 Document_9.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4388 2340 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 84 PID 2340 wrote to memory of 4388 2340 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 84 PID 2340 wrote to memory of 4388 2340 28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe 84 PID 4388 wrote to memory of 1100 4388 Document_9.exe 87 PID 4388 wrote to memory of 1100 4388 Document_9.exe 87 PID 4388 wrote to memory of 1100 4388 Document_9.exe 87 PID 4388 wrote to memory of 4364 4388 Document_9.exe 89 PID 4388 wrote to memory of 4364 4388 Document_9.exe 89 PID 4388 wrote to memory of 4364 4388 Document_9.exe 89 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 4388 wrote to memory of 2164 4388 Document_9.exe 91 PID 1100 wrote to memory of 2636 1100 cmd.exe 93 PID 1100 wrote to memory of 2636 1100 cmd.exe 93 PID 1100 wrote to memory of 2636 1100 cmd.exe 93 PID 4364 wrote to memory of 2904 4364 cmd.exe 94 PID 4364 wrote to memory of 2904 4364 cmd.exe 94 PID 4364 wrote to memory of 2904 4364 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2636 attrib.exe 2904 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe"C:\Users\Admin\AppData\Local\Temp\28143e132fd376bfd604ca691bcb7e17ebd5e53f33350857e28c4c7e902d3db3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe"2⤵
- Modifies security service
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Document_9.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\RarSFX0" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2904
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5f55924b6e77ced8d2502b2a3f54874da
SHA1c5e0c5e41aa5a58472d3f0260e2eae2f222a36c4
SHA2564b4bb0d6e309a1ebe80a5e6fc8c500ec766aaf4031c9c956de31e080c0da931d
SHA512be332b98cc4390fdcbd5d4cabdfbb5767b8b683eedbb42f7e9170c01301312e51654862ee79ba519fa7600cfbedd9346386682974d00f96b370052df76e0e98d