Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe
Resource
win7-20240903-en
General
-
Target
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe
-
Size
1.2MB
-
MD5
627edd7194c593aff1a4a9b20fb9c69d
-
SHA1
ee168450664c7dadf344144d84f0818714e9a63f
-
SHA256
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8
-
SHA512
b18d0d7fca2c78f8c7bdceb7dce1eb864aa49d62c694f68b6e7fddb4f0d379cd24696e3ab4298f8fd6ff764134ac1003efe217e66e98eb39c7dc9c0bbc058677
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGso6FamxC6w0BM6P32KNK/5HWY:ou0c++OCvkGs9FamS+932KA/8Y
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Darkcloud family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001937b-38.dat acprotect -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\miaou.vbs miaou.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 miaou.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 2760 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000190e0-12.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2760 2124 miaou.exe 32 -
resource yara_rule behavioral1/files/0x000700000001937b-38.dat upx behavioral1/memory/2760-39-0x0000000074AE0000-0x0000000074B49000-memory.dmp upx behavioral1/memory/2760-44-0x0000000074AE0000-0x0000000074B49000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miaou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2124 miaou.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 2124 miaou.exe 2124 miaou.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 2124 miaou.exe 2124 miaou.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2124 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 31 PID 2432 wrote to memory of 2124 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 31 PID 2432 wrote to memory of 2124 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 31 PID 2432 wrote to memory of 2124 2432 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 31 PID 2124 wrote to memory of 2760 2124 miaou.exe 32 PID 2124 wrote to memory of 2760 2124 miaou.exe 32 PID 2124 wrote to memory of 2760 2124 miaou.exe 32 PID 2124 wrote to memory of 2760 2124 miaou.exe 32 PID 2124 wrote to memory of 2760 2124 miaou.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\preinhered\miaou.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD54552df5b0fee36263675cf1d7504e881
SHA1862547347381cd224f6e064addde6cc94ca0e69f
SHA2561aa31906e75265352ad902c54349c2c763f2193b8b6b612d59d2b387d438d71c
SHA512984a4506899f016a51a1ba899883c3b34bfd81f5c5c920343256bb864a70eb0246cce2d595862f8fc6864bfe38b8a37c66ac42846075e9e872257fcd6554a98e
-
Filesize
1.2MB
MD5627edd7194c593aff1a4a9b20fb9c69d
SHA1ee168450664c7dadf344144d84f0818714e9a63f
SHA256cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8
SHA512b18d0d7fca2c78f8c7bdceb7dce1eb864aa49d62c694f68b6e7fddb4f0d379cd24696e3ab4298f8fd6ff764134ac1003efe217e66e98eb39c7dc9c0bbc058677
-
Filesize
161KB
MD5073a17b6cfb1112c6c838b2fba06a657
SHA1a54bb22489eaa8c52eb3e512aee522320530b0be
SHA256dcfcd16fbf0511d3f2b3792e5493fa22d7291e4bb2efbfa5ade5002a04fc2cab
SHA5125bc8307350bd8ba09fa9eedddc62f1dba65db62eb09ae64e0adff4dfad0937dbec5b621f294f5980bf77033faac3bfe200945c0280606915ee9a82d34a003b9e