Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2025, 21:58

General

  • Target

    2a7e321b570eb2d1da85e69873cef59a8da503853450a3301c0486ed1690b58d.exe

  • Size

    1.7MB

  • MD5

    657c459103c56deacd291dd0511e798f

  • SHA1

    38af9361c5e7e4a357d72496309f82cea118f95d

  • SHA256

    2a7e321b570eb2d1da85e69873cef59a8da503853450a3301c0486ed1690b58d

  • SHA512

    952b7f5582da092356f18c61ace3dff08dc0cb2614645b834a268d7fb42c89dd335e320935d3efe9f3b6d598db62af814dfca73444e094baa6b43297eef126cd

  • SSDEEP

    24576:cl77xk/v8zBbP+BSiahTtI65nHl75Dp8Hnh5I+Oks/bGFwNr/gG+A+x5YYAd1KrK:i6/vGqahTas1Qnh5I+k/gGMPA0Pof

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

xfuego.no-ip.org:22

Mutex

DC_MUTEX-C7W49TJ

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    �h8Jc*c9�rVq

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7e321b570eb2d1da85e69873cef59a8da503853450a3301c0486ed1690b58d.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7e321b570eb2d1da85e69873cef59a8da503853450a3301c0486ed1690b58d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
        PID:2700
      • C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe
        "C:\Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe"
        2⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\TEMP:5F468ABB

      Filesize

      135B

      MD5

      b6b1887759621eaee65c3054caa2f535

      SHA1

      4eeaab2b9c63f5a803d637eadbfdd76b4fd20f9f

      SHA256

      596ed525a7c9ed56391cbff70c294ff69da0b4d936ee79b69c5bc555b570f856

      SHA512

      37b24e1bb8fc7f6866209cfaea55612d693cc2ee078f566ee73dde92e9d13ee1532cae2f02bb802ca856b43b12e1387ac049296592dffe20d151fa7d44322edb

    • \Users\Admin\AppData\Local\Temp\Windupdt\winupdate.exe

      Filesize

      1.7MB

      MD5

      657c459103c56deacd291dd0511e798f

      SHA1

      38af9361c5e7e4a357d72496309f82cea118f95d

      SHA256

      2a7e321b570eb2d1da85e69873cef59a8da503853450a3301c0486ed1690b58d

      SHA512

      952b7f5582da092356f18c61ace3dff08dc0cb2614645b834a268d7fb42c89dd335e320935d3efe9f3b6d598db62af814dfca73444e094baa6b43297eef126cd

    • memory/2084-14-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-16-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-7-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-13-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-12-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-18-0x00000000003A0000-0x00000000003A1000-memory.dmp

      Filesize

      4KB

    • memory/2084-17-0x00000000020D0000-0x0000000002205000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-11-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-15-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-22-0x00000000020D0000-0x0000000002205000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-0-0x00000000020D0000-0x0000000002205000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-30-0x00000000020D0000-0x0000000002205000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-32-0x0000000005E80000-0x0000000006100000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-47-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-6-0x00000000020D0000-0x0000000002205000-memory.dmp

      Filesize

      1.2MB

    • memory/2784-44-0x00000000026E0000-0x0000000002815000-memory.dmp

      Filesize

      1.2MB

    • memory/2784-58-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-45-0x0000000000CE0000-0x0000000000F60000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-48-0x0000000000CE0000-0x0000000000F60000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-38-0x00000000026E0000-0x0000000002815000-memory.dmp

      Filesize

      1.2MB

    • memory/2784-36-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-53-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-56-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-54-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-59-0x00000000026E0000-0x0000000002815000-memory.dmp

      Filesize

      1.2MB

    • memory/2784-57-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-37-0x0000000000CE0000-0x0000000000F60000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-55-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2784-65-0x00000000026E0000-0x0000000002815000-memory.dmp

      Filesize

      1.2MB

    • memory/2784-77-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2996-62-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2996-75-0x00000000028B0000-0x00000000029E5000-memory.dmp

      Filesize

      1.2MB

    • memory/2996-69-0x00000000028B0000-0x00000000029E5000-memory.dmp

      Filesize

      1.2MB

    • memory/2996-68-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2996-63-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB

    • memory/2996-60-0x0000000000400000-0x0000000000680000-memory.dmp

      Filesize

      2.5MB