Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe
Resource
win7-20240903-en
General
-
Target
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe
-
Size
1.2MB
-
MD5
627edd7194c593aff1a4a9b20fb9c69d
-
SHA1
ee168450664c7dadf344144d84f0818714e9a63f
-
SHA256
cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8
-
SHA512
b18d0d7fca2c78f8c7bdceb7dce1eb864aa49d62c694f68b6e7fddb4f0d379cd24696e3ab4298f8fd6ff764134ac1003efe217e66e98eb39c7dc9c0bbc058677
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGso6FamxC6w0BM6P32KNK/5HWY:ou0c++OCvkGs9FamS+932KA/8Y
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\miaou.vbs miaou.exe -
Executes dropped EXE 1 IoCs
pid Process 852 miaou.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000022756-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 852 set thread context of 2228 852 miaou.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miaou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 852 miaou.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 852 miaou.exe 852 miaou.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 852 miaou.exe 852 miaou.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 852 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 87 PID 1316 wrote to memory of 852 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 87 PID 1316 wrote to memory of 852 1316 cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe 87 PID 852 wrote to memory of 2228 852 miaou.exe 89 PID 852 wrote to memory of 2228 852 miaou.exe 89 PID 852 wrote to memory of 2228 852 miaou.exe 89 PID 852 wrote to memory of 2228 852 miaou.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\preinhered\miaou.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD54552df5b0fee36263675cf1d7504e881
SHA1862547347381cd224f6e064addde6cc94ca0e69f
SHA2561aa31906e75265352ad902c54349c2c763f2193b8b6b612d59d2b387d438d71c
SHA512984a4506899f016a51a1ba899883c3b34bfd81f5c5c920343256bb864a70eb0246cce2d595862f8fc6864bfe38b8a37c66ac42846075e9e872257fcd6554a98e
-
Filesize
1.2MB
MD5627edd7194c593aff1a4a9b20fb9c69d
SHA1ee168450664c7dadf344144d84f0818714e9a63f
SHA256cfb11e1abacfa8a2ac0354c382f132169a0e314569a9e5b97f0bdf62adb161a8
SHA512b18d0d7fca2c78f8c7bdceb7dce1eb864aa49d62c694f68b6e7fddb4f0d379cd24696e3ab4298f8fd6ff764134ac1003efe217e66e98eb39c7dc9c0bbc058677