Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 07:37
Behavioral task
behavioral1
Sample
e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe
Resource
win7-20240903-en
General
-
Target
e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe
-
Size
3.8MB
-
MD5
82a71836270b698f8d0358f96ceef910
-
SHA1
4d2fe8ff1b4a8b8ea9d3f723625d661893d318da
-
SHA256
e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cba
-
SHA512
4bfc9fbc25cd1d596b2ec70bfdd16f2fdcc4537350be0048e7e8e6c11813e61a9fe26a373a417fe5263f41f56dd3595b6f265640129e946a442818260618c02d
-
SSDEEP
98304:vJwakG4fYrq1HJvpliCQHawbzBbGSlaUEI96kdQDanpqHrO3ndI3/lL/v7zVwwXk:vJwakG4fYrq1HJvpliCQHawbzBbGSlaG
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mcsft.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe -
Executes dropped EXE 2 IoCs
pid Process 1172 mcsft.exe 1532 mcsft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1172 set thread context of 1532 1172 mcsft.exe 88 -
resource yara_rule behavioral2/memory/728-0-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/files/0x0008000000023c83-16.dat upx behavioral2/memory/728-30-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/memory/1532-31-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-34-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-35-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1172-36-0x0000000000400000-0x00000000007C9000-memory.dmp upx behavioral2/memory/1532-39-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-43-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-42-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-41-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-40-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-38-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-44-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-53-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1532-55-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsft.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mcsft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier mcsft.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mcsft.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1532 mcsft.exe Token: SeSecurityPrivilege 1532 mcsft.exe Token: SeTakeOwnershipPrivilege 1532 mcsft.exe Token: SeLoadDriverPrivilege 1532 mcsft.exe Token: SeSystemProfilePrivilege 1532 mcsft.exe Token: SeSystemtimePrivilege 1532 mcsft.exe Token: SeProfSingleProcessPrivilege 1532 mcsft.exe Token: SeIncBasePriorityPrivilege 1532 mcsft.exe Token: SeCreatePagefilePrivilege 1532 mcsft.exe Token: SeBackupPrivilege 1532 mcsft.exe Token: SeRestorePrivilege 1532 mcsft.exe Token: SeShutdownPrivilege 1532 mcsft.exe Token: SeDebugPrivilege 1532 mcsft.exe Token: SeSystemEnvironmentPrivilege 1532 mcsft.exe Token: SeChangeNotifyPrivilege 1532 mcsft.exe Token: SeRemoteShutdownPrivilege 1532 mcsft.exe Token: SeUndockPrivilege 1532 mcsft.exe Token: SeManageVolumePrivilege 1532 mcsft.exe Token: SeImpersonatePrivilege 1532 mcsft.exe Token: SeCreateGlobalPrivilege 1532 mcsft.exe Token: 33 1532 mcsft.exe Token: 34 1532 mcsft.exe Token: 35 1532 mcsft.exe Token: 36 1532 mcsft.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 1172 mcsft.exe 1532 mcsft.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 728 wrote to memory of 3760 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 83 PID 728 wrote to memory of 3760 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 83 PID 728 wrote to memory of 3760 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 83 PID 3760 wrote to memory of 216 3760 cmd.exe 86 PID 3760 wrote to memory of 216 3760 cmd.exe 86 PID 3760 wrote to memory of 216 3760 cmd.exe 86 PID 728 wrote to memory of 1172 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 87 PID 728 wrote to memory of 1172 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 87 PID 728 wrote to memory of 1172 728 e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe 87 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88 PID 1172 wrote to memory of 1532 1172 mcsft.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe"C:\Users\Admin\AppData\Local\Temp\e1321e20929f4242eddd93073bb1a51003537a17447e6532916217ca864e3cbaN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uyqZT.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:216
-
-
-
C:\Users\Admin\AppData\Roaming\mcsft.exe"C:\Users\Admin\AppData\Roaming\mcsft.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\mcsft.exeC:\Users\Admin\AppData\Roaming\mcsft.exe3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5a5feca573884d76f559b996d45e8ad9a
SHA10e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda
-
Filesize
3.8MB
MD509730f280e0729e1b4bd10ab25bac0df
SHA13e95238b31b992b1cde9f6a2e9fe1e756473cee4
SHA25600c67de6bb3a5e436d46280bb23060192e0746ff4a627eaee7776ee01a424f84
SHA51217e53750a83a85d9fd4d3181431aefaa96af219a69687291ded3c55902139ad618e13a99217d9bdd69f1ac402e7ac9b177e3b3b301fd2ed3f4a73395435ad1df