Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10f2259737b9...1a.exe
windows7-x64
10f2259737b9...1a.exe
windows10-2004-x64
10f26d7a7648...57.exe
windows7-x64
10f26d7a7648...57.exe
windows10-2004-x64
10f2728425ca...99.exe
windows7-x64
10f2728425ca...99.exe
windows10-2004-x64
10f27c496378...29.exe
windows7-x64
10f27c496378...29.exe
windows10-2004-x64
10f2e7cee938...9a.exe
windows7-x64
10f2e7cee938...9a.exe
windows10-2004-x64
10f2fe22a9b8...f7.exe
windows7-x64
1f2fe22a9b8...f7.exe
windows10-2004-x64
1f329b3a2d6...ab.exe
windows7-x64
10f329b3a2d6...ab.exe
windows10-2004-x64
10f34854f659...a1.exe
windows7-x64
10f34854f659...a1.exe
windows10-2004-x64
10f35d502490...e2.exe
windows7-x64
10f35d502490...e2.exe
windows10-2004-x64
10f36fde0983...fb.exe
windows7-x64
1f36fde0983...fb.exe
windows10-2004-x64
1f373a271fe...72.exe
windows7-x64
10f373a271fe...72.exe
windows10-2004-x64
10f386c97ec3...ed.exe
windows7-x64
10f386c97ec3...ed.exe
windows10-2004-x64
10f3873b73a0...14.exe
windows7-x64
10f3873b73a0...14.exe
windows10-2004-x64
10f3a76e9615...78.exe
windows7-x64
10f3a76e9615...78.exe
windows10-2004-x64
10f3eedde12e...df.exe
windows7-x64
10f3eedde12e...df.exe
windows10-2004-x64
10f3ef636642...36.exe
windows7-x64
10f3ef636642...36.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
f2259737b967bbe88fc74916f319c61a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f2259737b967bbe88fc74916f319c61a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
f26d7a764816fad6183d06a6fc996857.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
f26d7a764816fad6183d06a6fc996857.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
f2728425ca601bdf06725c7584a8d848f1fb0d90fc28e219157556534d1b3999.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
f2728425ca601bdf06725c7584a8d848f1fb0d90fc28e219157556534d1b3999.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
f27c4963784ed1d311afd03bdfbe000f499b67edd16c4af85d34e547b892ca29.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
f27c4963784ed1d311afd03bdfbe000f499b67edd16c4af85d34e547b892ca29.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
f2e7cee938a991ef6e4a0fcb64efc69a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
f2e7cee938a991ef6e4a0fcb64efc69a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
f2fe22a9b88a7181ef0a17fcbafba04ca86ac230251f2c02b3a2122056f7b8f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
f2fe22a9b88a7181ef0a17fcbafba04ca86ac230251f2c02b3a2122056f7b8f7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
f329b3a2d6b8a4688e82ffe1c491b2ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
f329b3a2d6b8a4688e82ffe1c491b2ab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
f34854f659c2a34199c5bd888e03750f7aacfdae48724f2f2c5a28aa4188d2a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
f34854f659c2a34199c5bd888e03750f7aacfdae48724f2f2c5a28aa4188d2a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
f35d502490f7522150c06d1bd7ca12e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
f35d502490f7522150c06d1bd7ca12e2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
f36fde098314a27faa2d29aeb76c2bfb.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
f36fde098314a27faa2d29aeb76c2bfb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
f386c97ec32e28437b074ba6fb3311ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
f386c97ec32e28437b074ba6fb3311ed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
f3873b73a0b2ef5c54ba8ed8a571bc14.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
f3873b73a0b2ef5c54ba8ed8a571bc14.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
f3a76e96152f78dfc595c893cc231178.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
f3a76e96152f78dfc595c893cc231178.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
f3eedde12ec9a2f363c13d643bd2acdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
f3eedde12ec9a2f363c13d643bd2acdf.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
f3ef636642aed1dd87c2fc6ee6307e36.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
f3ef636642aed1dd87c2fc6ee6307e36.exe
Resource
win10v2004-20250314-en
General
-
Target
f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe
-
Size
1.6MB
-
MD5
035fb85d4bfb5d363a2e19689c5293ec
-
SHA1
3d19aba6ea72ceef39689f1aac1cf79f48da3003
-
SHA256
f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472
-
SHA512
8308bb0f3d867ed63c57f29a345f97a2179277648910c2499e9cf016f84b0a09bb2aab50a59b258ee569fa79cb5d3269804f693a42db9228a903b9e3368d0a63
-
SSDEEP
24576:TK1mgY/IrFL0sp2ctQVvIUu6+HnihZVFGZo0Pzv8veL4uso/G3X3BrVv:hIgc2xn+CbVFGjL0veL42u35Vv
Malware Config
Extracted
darkcomet
Guest16
vendetta123.myftp.biz:1604
vendetta123.myftp.biz:8080
vendetta32.myftp.biz:8080
vendetta32.myftp.biz:1604
DC_MUTEX-EPHKD8X
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
GwGlrzWozjeS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Trojaner.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2704 attrib.exe 2004 attrib.exe -
Executes dropped EXE 2 IoCs
pid Process 2032 Trojaner.exe 2636 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 Trojaner.exe 2032 Trojaner.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" Trojaner.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Trojaner.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe Trojaner.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ Trojaner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iz1617645185b.gnq Trojaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\iz1617645185b.gnq\ = f332de6296862f6b64ff1148ab29d4958d915e9430a37040 Trojaner.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2032 Trojaner.exe Token: SeSecurityPrivilege 2032 Trojaner.exe Token: SeTakeOwnershipPrivilege 2032 Trojaner.exe Token: SeLoadDriverPrivilege 2032 Trojaner.exe Token: SeSystemProfilePrivilege 2032 Trojaner.exe Token: SeSystemtimePrivilege 2032 Trojaner.exe Token: SeProfSingleProcessPrivilege 2032 Trojaner.exe Token: SeIncBasePriorityPrivilege 2032 Trojaner.exe Token: SeCreatePagefilePrivilege 2032 Trojaner.exe Token: SeBackupPrivilege 2032 Trojaner.exe Token: SeRestorePrivilege 2032 Trojaner.exe Token: SeShutdownPrivilege 2032 Trojaner.exe Token: SeDebugPrivilege 2032 Trojaner.exe Token: SeSystemEnvironmentPrivilege 2032 Trojaner.exe Token: SeChangeNotifyPrivilege 2032 Trojaner.exe Token: SeRemoteShutdownPrivilege 2032 Trojaner.exe Token: SeUndockPrivilege 2032 Trojaner.exe Token: SeManageVolumePrivilege 2032 Trojaner.exe Token: SeImpersonatePrivilege 2032 Trojaner.exe Token: SeCreateGlobalPrivilege 2032 Trojaner.exe Token: 33 2032 Trojaner.exe Token: 34 2032 Trojaner.exe Token: 35 2032 Trojaner.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2032 1236 f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe 31 PID 1236 wrote to memory of 2032 1236 f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe 31 PID 1236 wrote to memory of 2032 1236 f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe 31 PID 1236 wrote to memory of 2032 1236 f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe 31 PID 2032 wrote to memory of 2832 2032 Trojaner.exe 32 PID 2032 wrote to memory of 2832 2032 Trojaner.exe 32 PID 2032 wrote to memory of 2832 2032 Trojaner.exe 32 PID 2032 wrote to memory of 2832 2032 Trojaner.exe 32 PID 2032 wrote to memory of 2848 2032 Trojaner.exe 33 PID 2032 wrote to memory of 2848 2032 Trojaner.exe 33 PID 2032 wrote to memory of 2848 2032 Trojaner.exe 33 PID 2032 wrote to memory of 2848 2032 Trojaner.exe 33 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2032 wrote to memory of 2900 2032 Trojaner.exe 35 PID 2832 wrote to memory of 2704 2832 cmd.exe 38 PID 2832 wrote to memory of 2704 2832 cmd.exe 38 PID 2832 wrote to memory of 2704 2832 cmd.exe 38 PID 2832 wrote to memory of 2704 2832 cmd.exe 38 PID 2848 wrote to memory of 2004 2848 cmd.exe 37 PID 2848 wrote to memory of 2004 2848 cmd.exe 37 PID 2848 wrote to memory of 2004 2848 cmd.exe 37 PID 2848 wrote to memory of 2004 2848 cmd.exe 37 PID 2032 wrote to memory of 2636 2032 Trojaner.exe 39 PID 2032 wrote to memory of 2636 2032 Trojaner.exe 39 PID 2032 wrote to memory of 2636 2032 Trojaner.exe 39 PID 2032 wrote to memory of 2636 2032 Trojaner.exe 39 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2704 attrib.exe 2004 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe"C:\Users\Admin\AppData\Local\Temp\f373a271fe4709f9373cd3f5d1519b4055cf99521118a2b8dc790e358b3e1472.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Trojaner.exe"C:\Users\Admin\AppData\Local\Temp\Trojaner.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\Trojaner.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\Trojaner.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2004
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD52cbc81bd2bba98618393305727b68d61
SHA103ab51a5bb74f7fdeb7c5e88446c00a964e7d01a
SHA2562ebecdbf36e47198d74d46b33fa5deceb9c6db379ce4c445730f8b1d034ca6dd
SHA5129703dc5dd27c2b123f30160697012d3d0693813223722bf701fb67351718a804b2b9ec70b913340586a27fd836bb25d629a2a3d085adab212c91d90398457582