Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2025, 13:24

General

  • Target

    JaffaCakes118_8364e860e726367d6d78b13bd3972b67.exe

  • Size

    1.5MB

  • MD5

    8364e860e726367d6d78b13bd3972b67

  • SHA1

    db0daadc7badb43a748c267e1ea9276354f14416

  • SHA256

    0ea3fa5df88df15b8201c18de2f11f942bf6b327f458232511f1edc43292039d

  • SHA512

    4a8bb84593f0624acf0830bf366793b56e1cc4c4a540680ac27644b04cd1239e48f08491871dbd99973f7e3a8e6bdfd418b32609f9a810bac5011fb44cb0fa86

  • SSDEEP

    24576:6vp6xBF77xC6GI8K6FFcY4w1LsTwTRtFS2tWVbRkamUKyJmqv0IM+8CGfHO:6iGIS7BRWwTRXtWRRkUpj0IHfn

Malware Config

Extracted

Family

darkcomet

Botnet

Gamer

C2

avg007.zapto.org:1177

Mutex

DCMIN_MUTEX-7AD3XJ7

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    tTie1MLzrlbp

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Themida packer 55 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8364e860e726367d6d78b13bd3972b67.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8364e860e726367d6d78b13bd3972b67.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8364e860e726367d6d78b13bd3972b67.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8364e860e726367d6d78b13bd3972b67.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe
        "C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe
          "C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe

    Filesize

    1.5MB

    MD5

    8364e860e726367d6d78b13bd3972b67

    SHA1

    db0daadc7badb43a748c267e1ea9276354f14416

    SHA256

    0ea3fa5df88df15b8201c18de2f11f942bf6b327f458232511f1edc43292039d

    SHA512

    4a8bb84593f0624acf0830bf366793b56e1cc4c4a540680ac27644b04cd1239e48f08491871dbd99973f7e3a8e6bdfd418b32609f9a810bac5011fb44cb0fa86

  • memory/2312-2-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-16-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-39-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-41-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-38-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-37-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-36-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-35-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-34-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-32-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-31-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-30-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-29-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-28-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-27-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-25-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-24-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-23-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-22-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-21-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-20-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-43-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-42-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-19-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-18-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-14-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2312-10-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-8-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-6-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-40-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-33-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-26-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-4-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-17-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-44-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-45-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-46-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-47-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-50-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-52-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-51-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-49-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-48-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2312-66-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-133-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-143-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-142-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-144-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-147-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-148-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-149-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-150-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-151-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-153-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-154-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB

  • memory/2792-155-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB