Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 23:43
Behavioral task
behavioral1
Sample
SteamGameAdder V9.1.0.exe
Resource
win7-20241010-en
General
-
Target
SteamGameAdder V9.1.0.exe
-
Size
756KB
-
MD5
0f472613d60ab2e381d7ce1efec9f0a0
-
SHA1
ee965531a2352e0c32385069cfd5135a0401044c
-
SHA256
55b4d7060a2a189fbf0311c52772c5fff93ebe80ddf02ed9f29e24ae89259585
-
SHA512
621f0226378aca81706ed2168124a557b4a081066f39bfa8d8d151aa3e03421c9a8943d7f7b48d20aa7736f67ea552cbf53d307dc496c1a5d180c0f4f4d39152
-
SSDEEP
12288:z9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/htsvv6:9Z1xuVVjfFoynPaVBUR8f+kN10EBUvv6
Malware Config
Extracted
darkcomet
Guest16
captaindrain007.no-ip.biz:1604
DC_MUTEX-59V53UU
-
InstallPath
Sys32.exe
-
gencode
kectiaqbSr6n
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
System32.exe
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Sys32.exe" SteamGameAdder V9.1.0.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4448 attrib.exe 3360 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation SteamGameAdder V9.1.0.exe -
Executes dropped EXE 1 IoCs
pid Process 1468 Sys32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System32.exe = "C:\\Windows\\system32\\Sys32.exe" SteamGameAdder V9.1.0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32.exe SteamGameAdder V9.1.0.exe File opened for modification C:\Windows\SysWOW64\Sys32.exe SteamGameAdder V9.1.0.exe File opened for modification C:\Windows\SysWOW64\ SteamGameAdder V9.1.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamGameAdder V9.1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sys32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1468 Sys32.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeSecurityPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeTakeOwnershipPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeLoadDriverPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeSystemProfilePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeSystemtimePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeProfSingleProcessPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeIncBasePriorityPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeCreatePagefilePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeBackupPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeRestorePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeShutdownPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeDebugPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeSystemEnvironmentPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeChangeNotifyPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeRemoteShutdownPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeUndockPrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeManageVolumePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeImpersonatePrivilege 4816 SteamGameAdder V9.1.0.exe Token: SeCreateGlobalPrivilege 4816 SteamGameAdder V9.1.0.exe Token: 33 4816 SteamGameAdder V9.1.0.exe Token: 34 4816 SteamGameAdder V9.1.0.exe Token: 35 4816 SteamGameAdder V9.1.0.exe Token: 36 4816 SteamGameAdder V9.1.0.exe Token: SeIncreaseQuotaPrivilege 1468 Sys32.exe Token: SeSecurityPrivilege 1468 Sys32.exe Token: SeTakeOwnershipPrivilege 1468 Sys32.exe Token: SeLoadDriverPrivilege 1468 Sys32.exe Token: SeSystemProfilePrivilege 1468 Sys32.exe Token: SeSystemtimePrivilege 1468 Sys32.exe Token: SeProfSingleProcessPrivilege 1468 Sys32.exe Token: SeIncBasePriorityPrivilege 1468 Sys32.exe Token: SeCreatePagefilePrivilege 1468 Sys32.exe Token: SeBackupPrivilege 1468 Sys32.exe Token: SeRestorePrivilege 1468 Sys32.exe Token: SeShutdownPrivilege 1468 Sys32.exe Token: SeDebugPrivilege 1468 Sys32.exe Token: SeSystemEnvironmentPrivilege 1468 Sys32.exe Token: SeChangeNotifyPrivilege 1468 Sys32.exe Token: SeRemoteShutdownPrivilege 1468 Sys32.exe Token: SeUndockPrivilege 1468 Sys32.exe Token: SeManageVolumePrivilege 1468 Sys32.exe Token: SeImpersonatePrivilege 1468 Sys32.exe Token: SeCreateGlobalPrivilege 1468 Sys32.exe Token: 33 1468 Sys32.exe Token: 34 1468 Sys32.exe Token: 35 1468 Sys32.exe Token: 36 1468 Sys32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1468 Sys32.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1064 4816 SteamGameAdder V9.1.0.exe 82 PID 4816 wrote to memory of 1064 4816 SteamGameAdder V9.1.0.exe 82 PID 4816 wrote to memory of 1064 4816 SteamGameAdder V9.1.0.exe 82 PID 4816 wrote to memory of 4872 4816 SteamGameAdder V9.1.0.exe 83 PID 4816 wrote to memory of 4872 4816 SteamGameAdder V9.1.0.exe 83 PID 4816 wrote to memory of 4872 4816 SteamGameAdder V9.1.0.exe 83 PID 4816 wrote to memory of 1468 4816 SteamGameAdder V9.1.0.exe 86 PID 4816 wrote to memory of 1468 4816 SteamGameAdder V9.1.0.exe 86 PID 4816 wrote to memory of 1468 4816 SteamGameAdder V9.1.0.exe 86 PID 4872 wrote to memory of 4448 4872 cmd.exe 87 PID 4872 wrote to memory of 4448 4872 cmd.exe 87 PID 4872 wrote to memory of 4448 4872 cmd.exe 87 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1468 wrote to memory of 2204 1468 Sys32.exe 88 PID 1064 wrote to memory of 3360 1064 cmd.exe 89 PID 1064 wrote to memory of 3360 1064 cmd.exe 89 PID 1064 wrote to memory of 3360 1064 cmd.exe 89 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4448 attrib.exe 3360 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamGameAdder V9.1.0.exe"C:\Users\Admin\AppData\Local\Temp\SteamGameAdder V9.1.0.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\SteamGameAdder V9.1.0.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\SteamGameAdder V9.1.0.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4448
-
-
-
C:\Windows\SysWOW64\Sys32.exe"C:\Windows\system32\Sys32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD50f472613d60ab2e381d7ce1efec9f0a0
SHA1ee965531a2352e0c32385069cfd5135a0401044c
SHA25655b4d7060a2a189fbf0311c52772c5fff93ebe80ddf02ed9f29e24ae89259585
SHA512621f0226378aca81706ed2168124a557b4a081066f39bfa8d8d151aa3e03421c9a8943d7f7b48d20aa7736f67ea552cbf53d307dc496c1a5d180c0f4f4d39152