Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2025, 08:45 UTC

General

  • Target

    JaffaCakes118_82220ac9f5896e50ad4745902891a61f.exe

  • Size

    737KB

  • MD5

    82220ac9f5896e50ad4745902891a61f

  • SHA1

    2294278d3e8fb38b15d087dd38398d172daf22c3

  • SHA256

    6cf28a426767f07fde9cbad3adb58fe10eb42f425405ef232248d22bfd5044c4

  • SHA512

    c12b32e3bcfb67fa0fc261a27acb78916a52e31fee696daabd3a7d263062c272211757d1ed36b11471e718407f0d306c036d158ebcf0b9879d242c3c53f5763d

  • SSDEEP

    12288:c7LsEOC0H7aSEEflgOVhz8U1CADfmfZc6LfaSWHrH1/WecHcvednQJubeKbd5H:kF29n/S+rVreueb7H

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-S121UH1

Attributes
  • gencode

    U17$DuZXNaRn

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain
1
#KCMDDC2#-890

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82220ac9f5896e50ad4745902891a61f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82220ac9f5896e50ad4745902891a61f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
        PID:1552
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Checks BIOS information in registry
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2532

    Network

      No results found
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    • 127.0.0.1:1604
      vbc.exe
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1960-0-0x00000000741C1000-0x00000000741C2000-memory.dmp

      Filesize

      4KB

    • memory/1960-1-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/1960-2-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/1960-22-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2532-21-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-23-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-10-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2532-7-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-5-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-13-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-15-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-16-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-17-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-19-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-18-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-11-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-20-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-3-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-12-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-24-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-25-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-26-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-27-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-28-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-29-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-30-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-31-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-32-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-33-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-34-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-35-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-36-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-37-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/2532-38-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.