Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 09:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FACTURA DE ENVIO DE DHL.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
FACTURA DE ENVIO DE DHL.exe
-
Size
522KB
-
MD5
01520fc80bd96941d4d080e7f6e623e5
-
SHA1
ff132ad4e6f7e41b5bc82a0e0de52950cc906b06
-
SHA256
ecbdaea604f259a7535b32c7abcd25139af9b8abe04a45d24614212c9d8ea67c
-
SHA512
b90c50ed06f439940dac865bee34a925c8be1101ff6ee3ced37dfd701046f53bbc064488ef0da0b812c894e7af104289d5c1d5aa7afc82c9103879357fe3360c
-
SSDEEP
6144:CoXuKg0NWPnxDxFJ+6NlW9/2NEB2z2GoU3AI85SizO8887dI+IkEWh+E:Co+qNWPnxtNA9/mK2aC8886+
Malware Config
Extracted
Family
darkcloud
Credentials
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Signatures
-
Darkcloud family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1656 created 3452 1656 FACTURA DE ENVIO DE DHL.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FallbackBuffer.vbs FACTURA DE ENVIO DE DHL.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1656 set thread context of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACTURA DE ENVIO DE DHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1656 FACTURA DE ENVIO DE DHL.exe 1656 FACTURA DE ENVIO DE DHL.exe 1656 FACTURA DE ENVIO DE DHL.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1656 FACTURA DE ENVIO DE DHL.exe Token: SeDebugPrivilege 1656 FACTURA DE ENVIO DE DHL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93 PID 1656 wrote to memory of 2120 1656 FACTURA DE ENVIO DE DHL.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\FACTURA DE ENVIO DE DHL.exe"C:\Users\Admin\AppData\Local\Temp\FACTURA DE ENVIO DE DHL.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2120
-