Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe
Resource
win10v2004-20250129-en
General
-
Target
ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe
-
Size
1.9MB
-
MD5
36c46585bd77a2be351a74daa6c55490
-
SHA1
37a02085b0e1f41e1476e04e8caabe4d65353f74
-
SHA256
ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008af
-
SHA512
7b496ec38dcd8920b09c0d4c9813523c89378c238ee211f9b44c88dd4dcf91c91284a10c4ea8b7acff55b4836b834853cd62fd3f58ef0278770d45dde3d9e05d
-
SSDEEP
24576:g5Z42w7NRqQ6pbq+1SSFqEdTJD926APlDFndO:W4Bx6g+1tFrdTd9YPFm
Malware Config
Extracted
darkcomet
Guest16
sepha.ddns.net:1604
DC_MUTEX-Y6NCRQF
-
InstallPath
Skype\Skype.exe
-
gencode
6yz9jgN489iC
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Skype\\Skype.exe" ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Skype.EXE -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2308 attrib.exe 2708 attrib.exe -
Deletes itself 1 IoCs
pid Process 2808 notepad.exe -
Executes dropped EXE 2 IoCs
pid Process 2956 Skype.exe 1864 Skype.EXE -
Loads dropped DLL 2 IoCs
pid Process 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Skype\\Skype.exe" ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Skype\\Skype.exe" Skype.EXE -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\M: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\R: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\V: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\X: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\I: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\W: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\Z: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\I: Skype.exe File opened (read-only) \??\J: Skype.exe File opened (read-only) \??\N: Skype.exe File opened (read-only) \??\S: Skype.exe File opened (read-only) \??\W: Skype.exe File opened (read-only) \??\H: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\G: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\T: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\E: Skype.exe File opened (read-only) \??\O: Skype.exe File opened (read-only) \??\Y: Skype.exe File opened (read-only) \??\A: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\O: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\S: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\A: Skype.exe File opened (read-only) \??\B: Skype.exe File opened (read-only) \??\B: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\P: Skype.exe File opened (read-only) \??\T: Skype.exe File opened (read-only) \??\U: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\N: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\R: Skype.exe File opened (read-only) \??\K: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\H: Skype.exe File opened (read-only) \??\K: Skype.exe File opened (read-only) \??\M: Skype.exe File opened (read-only) \??\Q: Skype.exe File opened (read-only) \??\Z: Skype.exe File opened (read-only) \??\P: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\J: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\Q: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\Y: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\G: Skype.exe File opened (read-only) \??\L: Skype.exe File opened (read-only) \??\U: Skype.exe File opened (read-only) \??\V: Skype.exe File opened (read-only) \??\E: ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe File opened (read-only) \??\X: Skype.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1156 set thread context of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 2956 set thread context of 1864 2956 Skype.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skype.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 Skype.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeSecurityPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeTakeOwnershipPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeLoadDriverPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeSystemProfilePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeSystemtimePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeProfSingleProcessPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeIncBasePriorityPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeCreatePagefilePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeBackupPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeRestorePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeShutdownPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeDebugPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeSystemEnvironmentPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeChangeNotifyPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeRemoteShutdownPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeUndockPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeManageVolumePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeImpersonatePrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeCreateGlobalPrivilege 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: 33 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: 34 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: 35 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE Token: SeIncreaseQuotaPrivilege 1864 Skype.EXE Token: SeSecurityPrivilege 1864 Skype.EXE Token: SeTakeOwnershipPrivilege 1864 Skype.EXE Token: SeLoadDriverPrivilege 1864 Skype.EXE Token: SeSystemProfilePrivilege 1864 Skype.EXE Token: SeSystemtimePrivilege 1864 Skype.EXE Token: SeProfSingleProcessPrivilege 1864 Skype.EXE Token: SeIncBasePriorityPrivilege 1864 Skype.EXE Token: SeCreatePagefilePrivilege 1864 Skype.EXE Token: SeBackupPrivilege 1864 Skype.EXE Token: SeRestorePrivilege 1864 Skype.EXE Token: SeShutdownPrivilege 1864 Skype.EXE Token: SeDebugPrivilege 1864 Skype.EXE Token: SeSystemEnvironmentPrivilege 1864 Skype.EXE Token: SeChangeNotifyPrivilege 1864 Skype.EXE Token: SeRemoteShutdownPrivilege 1864 Skype.EXE Token: SeUndockPrivilege 1864 Skype.EXE Token: SeManageVolumePrivilege 1864 Skype.EXE Token: SeImpersonatePrivilege 1864 Skype.EXE Token: SeCreateGlobalPrivilege 1864 Skype.EXE Token: 33 1864 Skype.EXE Token: 34 1864 Skype.EXE Token: 35 1864 Skype.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 2956 Skype.exe 1864 Skype.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 1156 wrote to memory of 2620 1156 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe 30 PID 2620 wrote to memory of 2932 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 31 PID 2620 wrote to memory of 2932 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 31 PID 2620 wrote to memory of 2932 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 31 PID 2620 wrote to memory of 2932 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 31 PID 2620 wrote to memory of 2952 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 33 PID 2620 wrote to memory of 2952 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 33 PID 2620 wrote to memory of 2952 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 33 PID 2620 wrote to memory of 2952 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 33 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2620 wrote to memory of 2808 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 35 PID 2932 wrote to memory of 2308 2932 cmd.exe 37 PID 2932 wrote to memory of 2308 2932 cmd.exe 37 PID 2932 wrote to memory of 2308 2932 cmd.exe 37 PID 2932 wrote to memory of 2308 2932 cmd.exe 37 PID 2952 wrote to memory of 2708 2952 cmd.exe 36 PID 2952 wrote to memory of 2708 2952 cmd.exe 36 PID 2952 wrote to memory of 2708 2952 cmd.exe 36 PID 2952 wrote to memory of 2708 2952 cmd.exe 36 PID 2620 wrote to memory of 2956 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 38 PID 2620 wrote to memory of 2956 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 38 PID 2620 wrote to memory of 2956 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 38 PID 2620 wrote to memory of 2956 2620 ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE 38 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 PID 2956 wrote to memory of 1864 2956 Skype.exe 39 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2708 attrib.exe 2308 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe"C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE"C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008afN.EXE" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2708
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Skype\Skype.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Skype\Skype.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\ProgramData\Microsoft\Windows\Start Menu\Skype\Skype.EXE"C:\ProgramData\Microsoft\Windows\Start Menu\Skype\Skype.EXE"4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD536c46585bd77a2be351a74daa6c55490
SHA137a02085b0e1f41e1476e04e8caabe4d65353f74
SHA256ea26c634ff914ba026d0fafe1882a2a727a05740dc97da1f6a6d76c62af008af
SHA5127b496ec38dcd8920b09c0d4c9813523c89378c238ee211f9b44c88dd4dcf91c91284a10c4ea8b7acff55b4836b834853cd62fd3f58ef0278770d45dde3d9e05d