Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe
Resource
win7-20240903-en
General
-
Target
5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe
-
Size
520KB
-
MD5
ef9bde652f3f2ef3dd6899cb39e48130
-
SHA1
c6a2673bb81ea5df6126c0ce486464f9ffc2545d
-
SHA256
5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6
-
SHA512
9e30484886e7d8a3063378c0d31a95409717a1ebd0b49eb4ea719788b39cff0ecad53974a7fe7b56bd832a862c37fa00cea2afc65ee1160e434f2da9efe4a9df
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbh:f9fC3hh29Ya77A90aFtDfT5IMbh
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 5008 winupd.exe 3984 winupd.exe 1692 winupd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3492 set thread context of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 5008 set thread context of 3984 5008 winupd.exe 100 PID 5008 set thread context of 1692 5008 winupd.exe 101 -
resource yara_rule behavioral2/memory/1692-33-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-34-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-39-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-40-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-41-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-45-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1692-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3680 1836 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1836 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1692 winupd.exe Token: SeSecurityPrivilege 1692 winupd.exe Token: SeTakeOwnershipPrivilege 1692 winupd.exe Token: SeLoadDriverPrivilege 1692 winupd.exe Token: SeSystemProfilePrivilege 1692 winupd.exe Token: SeSystemtimePrivilege 1692 winupd.exe Token: SeProfSingleProcessPrivilege 1692 winupd.exe Token: SeIncBasePriorityPrivilege 1692 winupd.exe Token: SeCreatePagefilePrivilege 1692 winupd.exe Token: SeBackupPrivilege 1692 winupd.exe Token: SeRestorePrivilege 1692 winupd.exe Token: SeShutdownPrivilege 1692 winupd.exe Token: SeDebugPrivilege 1692 winupd.exe Token: SeSystemEnvironmentPrivilege 1692 winupd.exe Token: SeChangeNotifyPrivilege 1692 winupd.exe Token: SeRemoteShutdownPrivilege 1692 winupd.exe Token: SeUndockPrivilege 1692 winupd.exe Token: SeManageVolumePrivilege 1692 winupd.exe Token: SeImpersonatePrivilege 1692 winupd.exe Token: SeCreateGlobalPrivilege 1692 winupd.exe Token: 33 1692 winupd.exe Token: 34 1692 winupd.exe Token: 35 1692 winupd.exe Token: 36 1692 winupd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 3640 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 5008 winupd.exe 3984 winupd.exe 1692 winupd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3492 wrote to memory of 3640 3492 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 98 PID 3640 wrote to memory of 5008 3640 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 99 PID 3640 wrote to memory of 5008 3640 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 99 PID 3640 wrote to memory of 5008 3640 5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe 99 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 3984 5008 winupd.exe 100 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 5008 wrote to memory of 1692 5008 winupd.exe 101 PID 3984 wrote to memory of 1836 3984 winupd.exe 102 PID 3984 wrote to memory of 1836 3984 winupd.exe 102 PID 3984 wrote to memory of 1836 3984 winupd.exe 102 PID 3984 wrote to memory of 1836 3984 winupd.exe 102 PID 3984 wrote to memory of 1836 3984 winupd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe"C:\Users\Admin\AppData\Local\Temp\5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe"C:\Users\Admin\AppData\Local\Temp\5ca4e0ff5d89afc615b182b55b62398caef27525dd6ba7827c44fb7e1ed138c6N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exeC:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 2726⤵
- Program crash
PID:3680
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"C:\Users\Admin\AppData\Roaming\Microsoft\winupd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1836 -ip 18361⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD55e975fdaa9e5bc5ed495d8a093a2a7b9
SHA15bbe64a33a93be768b771810b07cb08bb6a9fad5
SHA25632d1ca1f2491878bfe8e075a4754cfabe02e96573fae63e87fa99357baadd4fe
SHA5129617465612bd1c700905be45f2b51dee48b3dafe06d302183340231b8251420c2840b798b5921c7f1fa2acf5e0d70d8ec3aa805f432446bc4f8874ac361f28d3