Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe
Resource
win7-20240729-en
General
-
Target
43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe
-
Size
729KB
-
MD5
6f2fcf21ba49874ed0681d510d5152d0
-
SHA1
3dea609de221de549e093017609f09968a8a5413
-
SHA256
43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659f
-
SHA512
2710bae37f5f290dd931555b680731af2ce440402f590f9fd4d8e2bca716798a43645d0cc75b7882f19cda96cf6ffab589b5eb28f2ba0bb5af304802c7a13326
-
SSDEEP
12288:uLU768X1JnK+62pn/XTBeB5vpAPN5DFY+4zSsva0beWTr+YzZNQPUFhpd4oSYxlh:z68PK+BNg9GY+4pbaYNNQIpdZSgh
Malware Config
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 Crypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4068 Crypted.exe Token: SeSecurityPrivilege 4068 Crypted.exe Token: SeTakeOwnershipPrivilege 4068 Crypted.exe Token: SeLoadDriverPrivilege 4068 Crypted.exe Token: SeSystemProfilePrivilege 4068 Crypted.exe Token: SeSystemtimePrivilege 4068 Crypted.exe Token: SeProfSingleProcessPrivilege 4068 Crypted.exe Token: SeIncBasePriorityPrivilege 4068 Crypted.exe Token: SeCreatePagefilePrivilege 4068 Crypted.exe Token: SeBackupPrivilege 4068 Crypted.exe Token: SeRestorePrivilege 4068 Crypted.exe Token: SeShutdownPrivilege 4068 Crypted.exe Token: SeDebugPrivilege 4068 Crypted.exe Token: SeSystemEnvironmentPrivilege 4068 Crypted.exe Token: SeChangeNotifyPrivilege 4068 Crypted.exe Token: SeRemoteShutdownPrivilege 4068 Crypted.exe Token: SeUndockPrivilege 4068 Crypted.exe Token: SeManageVolumePrivilege 4068 Crypted.exe Token: SeImpersonatePrivilege 4068 Crypted.exe Token: SeCreateGlobalPrivilege 4068 Crypted.exe Token: 33 4068 Crypted.exe Token: 34 4068 Crypted.exe Token: 35 4068 Crypted.exe Token: 36 4068 Crypted.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 808 wrote to memory of 4068 808 43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe 82 PID 808 wrote to memory of 4068 808 43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe 82 PID 808 wrote to memory of 4068 808 43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe"C:\Users\Admin\AppData\Local\Temp\43cb66688bfb750b12dbc3fe205e36f35c1bc4aaf863b6a93af0f71b241e659fN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD51f61b9b8977809cab81778f41dd13d82
SHA19b8f94791ed4d4d5afa6d634f8d333345c0c7b71
SHA256ca117f8ce78ddd1391c8481c1a936b8a375b0f402161915aa02dce0361084536
SHA51224e504c44cef1f66d8417169349b00c0357cc477ac4a90ade189ae890a4d9968ca75918830b3c5a4c09d16374070f26fd87293ed4e52f57cca649819635445f9