Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
comprobantedepago.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
comprobantedepago.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Skyldsflelsers.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Skyldsflelsers.ps1
Resource
win10v2004-20250217-en
General
-
Target
comprobantedepago.exe
-
Size
819KB
-
MD5
969da5cc61a21e2d5fd00a52254ecd8e
-
SHA1
3f3cb9fdf47343f8e4d88e5171ad3b57ed6c4bad
-
SHA256
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18
-
SHA512
6df74d8e45b5db927d8962e453f379b18ba79dce91a8e0677b55a36c1a57f38c43f677091d280d1abcbcad2b214299aeb02f2784047411e2d62a6e0912556e60
-
SSDEEP
12288:1gP0I82X5K+GDnvy1eSLR0lUEkyZtyj6ittqTH3oEuprboHlExvyBBApy2HIxod3:EFJsDnylcpZk64oYEGc+yTARioCLC
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot7733877678:AAEqT6ly9PGheBCvOkuDttTsF2fRwpgtX5s/sendMessage?chat_id=5039346757
Signatures
-
Darkcloud family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3104 powershell.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 34 636 msiexec.exe 36 636 msiexec.exe 38 636 msiexec.exe 40 636 msiexec.exe 42 636 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 drive.google.com 33 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 636 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3104 powershell.exe 636 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comprobantedepago.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe 3104 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3104 powershell.exe Token: SeIncreaseQuotaPrivilege 3104 powershell.exe Token: SeSecurityPrivilege 3104 powershell.exe Token: SeTakeOwnershipPrivilege 3104 powershell.exe Token: SeLoadDriverPrivilege 3104 powershell.exe Token: SeSystemProfilePrivilege 3104 powershell.exe Token: SeSystemtimePrivilege 3104 powershell.exe Token: SeProfSingleProcessPrivilege 3104 powershell.exe Token: SeIncBasePriorityPrivilege 3104 powershell.exe Token: SeCreatePagefilePrivilege 3104 powershell.exe Token: SeBackupPrivilege 3104 powershell.exe Token: SeRestorePrivilege 3104 powershell.exe Token: SeShutdownPrivilege 3104 powershell.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeSystemEnvironmentPrivilege 3104 powershell.exe Token: SeRemoteShutdownPrivilege 3104 powershell.exe Token: SeUndockPrivilege 3104 powershell.exe Token: SeManageVolumePrivilege 3104 powershell.exe Token: 33 3104 powershell.exe Token: 34 3104 powershell.exe Token: 35 3104 powershell.exe Token: 36 3104 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 636 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3104 2172 comprobantedepago.exe 87 PID 2172 wrote to memory of 3104 2172 comprobantedepago.exe 87 PID 2172 wrote to memory of 3104 2172 comprobantedepago.exe 87 PID 3104 wrote to memory of 636 3104 powershell.exe 96 PID 3104 wrote to memory of 636 3104 powershell.exe 96 PID 3104 wrote to memory of 636 3104 powershell.exe 96 PID 3104 wrote to memory of 636 3104 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\comprobantedepago.exe"C:\Users\Admin\AppData\Local\Temp\comprobantedepago.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Telemeters=GC -raw 'C:\Users\Admin\AppData\Local\Temp\gypsoplast\witherdeed\Skyldsflelsers.Pos';$Gonophorous=$Telemeters.SubString(53202,3);.$Gonophorous($Telemeters)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
347KB
MD5b309e0c56e116ca4bb506532d3301d26
SHA1dd262120aff0dcc56ca5c142dfe9a2e0c5a754a6
SHA256f32f4655ae63807af3841e5b4f806b4cac43cc993417fc74ff0403e8037efa39
SHA5120976fa442e5ba759922f738cc0aad568573b88d941a6b1d5cf9b09643566b59736c69d75ad20f7b73c35bcc0f602e498c4498c32a7c3273a7e4729701ff2a1cb
-
Filesize
51KB
MD5550953a2f63ed2b48ebf6f76343105dc
SHA1f9425cafc739b32c655b05afdf9a5930337f2a54
SHA256f4c99919eaf75b521f3e08ec3e4378cc546a07de51735e48d7cf9110a4afec3c
SHA512956bb1f66503873a3b721875123c485ca47e7f9f9ce14ce451a2a4b0f1c705b40774ac1569bdb41e83758e880586e1f7740598b3112744e0b68720ae4e0deab3