Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/01/2023, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe
Resource
win10v2004-20221111-en
General
-
Target
HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe
-
Size
768KB
-
MD5
ca77b734327afb186e37d78d948034e8
-
SHA1
73d0f64044802166bf6c3ca982a3f5ba5405c81e
-
SHA256
b12fbaf6b6ba8add5b7d2f86c8dc9020e087a164b7a022c0058dd397754352f4
-
SHA512
d03b22bca2262f4acd8054c419dac9af28f33b90950104bed89cf2e35419f373f0d306e8a08532eab2c99e2d11bec0093c38fd1040a78e063225948b4add7050
-
SSDEEP
12288:kr9okJ1XGTNrrxqFcT7K2p+CMWOvE+LKxPSRwqTqHjgL2NdLwQmhJSGwHDkP:C9rqJS2AxZWp5Hj8oOFQD8
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral1/files/0x000a0000000122e9-57.dat dcrat behavioral1/files/0x000a0000000122e9-59.dat dcrat behavioral1/files/0x00090000000122ed-65.dat dcrat behavioral1/files/0x00090000000122ed-67.dat dcrat behavioral1/files/0x00090000000122ed-68.dat dcrat behavioral1/memory/1816-69-0x0000000000F00000-0x0000000001020000-memory.dmp dcrat behavioral1/files/0x0008000000012314-81.dat dcrat behavioral1/files/0x0008000000012314-82.dat dcrat behavioral1/memory/1604-83-0x0000000000030000-0x0000000000150000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
pid Process 1340 Adobe_Premiere_Pro_2020.exe 1816 security.exe 1604 conhost.exe -
Loads dropped DLL 1 IoCs
pid Process 1716 cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\catsrvut\smss.exe security.exe File created C:\Windows\System32\catsrvut\69ddcba757bf72f7d36c464c71f42baab150b2b9 security.exe File created C:\Windows\System32\C_10000\conhost.exe security.exe File created C:\Windows\System32\C_10000\088424020bedd6b28ac7fd22ee35dcd7322895ce security.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows NT\Accessories\services.exe security.exe File created C:\Program Files (x86)\Windows NT\Accessories\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d security.exe File created C:\Program Files (x86)\Windows NT\Accessories\services.exe security.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\write\explorer.exe security.exe File created C:\Windows\write\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 security.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe 1860 schtasks.exe 1684 schtasks.exe 552 schtasks.exe 1748 schtasks.exe 524 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1888 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 security.exe 1604 conhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1816 security.exe Token: SeDebugPrivilege 1604 conhost.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1340 1576 HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe 28 PID 1576 wrote to memory of 1340 1576 HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe 28 PID 1576 wrote to memory of 1340 1576 HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe 28 PID 1576 wrote to memory of 1340 1576 HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe 28 PID 1340 wrote to memory of 1416 1340 Adobe_Premiere_Pro_2020.exe 29 PID 1340 wrote to memory of 1416 1340 Adobe_Premiere_Pro_2020.exe 29 PID 1340 wrote to memory of 1416 1340 Adobe_Premiere_Pro_2020.exe 29 PID 1340 wrote to memory of 1416 1340 Adobe_Premiere_Pro_2020.exe 29 PID 1416 wrote to memory of 1716 1416 WScript.exe 30 PID 1416 wrote to memory of 1716 1416 WScript.exe 30 PID 1416 wrote to memory of 1716 1416 WScript.exe 30 PID 1416 wrote to memory of 1716 1416 WScript.exe 30 PID 1716 wrote to memory of 1816 1716 cmd.exe 32 PID 1716 wrote to memory of 1816 1716 cmd.exe 32 PID 1716 wrote to memory of 1816 1716 cmd.exe 32 PID 1716 wrote to memory of 1816 1716 cmd.exe 32 PID 1816 wrote to memory of 1748 1816 security.exe 34 PID 1816 wrote to memory of 1748 1816 security.exe 34 PID 1816 wrote to memory of 1748 1816 security.exe 34 PID 1816 wrote to memory of 524 1816 security.exe 36 PID 1816 wrote to memory of 524 1816 security.exe 36 PID 1816 wrote to memory of 524 1816 security.exe 36 PID 1816 wrote to memory of 1084 1816 security.exe 38 PID 1816 wrote to memory of 1084 1816 security.exe 38 PID 1816 wrote to memory of 1084 1816 security.exe 38 PID 1816 wrote to memory of 1860 1816 security.exe 40 PID 1816 wrote to memory of 1860 1816 security.exe 40 PID 1816 wrote to memory of 1860 1816 security.exe 40 PID 1816 wrote to memory of 1684 1816 security.exe 42 PID 1816 wrote to memory of 1684 1816 security.exe 42 PID 1816 wrote to memory of 1684 1816 security.exe 42 PID 1816 wrote to memory of 552 1816 security.exe 44 PID 1816 wrote to memory of 552 1816 security.exe 44 PID 1816 wrote to memory of 552 1816 security.exe 44 PID 1816 wrote to memory of 328 1816 security.exe 46 PID 1816 wrote to memory of 328 1816 security.exe 46 PID 1816 wrote to memory of 328 1816 security.exe 46 PID 328 wrote to memory of 892 328 cmd.exe 48 PID 328 wrote to memory of 892 328 cmd.exe 48 PID 328 wrote to memory of 892 328 cmd.exe 48 PID 328 wrote to memory of 1888 328 cmd.exe 49 PID 328 wrote to memory of 1888 328 cmd.exe 49 PID 328 wrote to memory of 1888 328 cmd.exe 49 PID 328 wrote to memory of 1604 328 cmd.exe 50 PID 328 wrote to memory of 1604 328 cmd.exe 50 PID 328 wrote to memory of 1604 328 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.MSIL.Generic-b12fbaf6b6ba8add5b7d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Adobe_Premiere_Pro_2020.exe"C:\Users\Admin\AppData\Local\Temp\Adobe_Premiere_Pro_2020.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\FUJZXaGbfikh3OCtrxlc1i.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Adobe\HrklzIU7CdwrqnHUZC.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\Adobe\security.exe"C:\Users\Admin\AppData\Roaming\Adobe\security.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\services.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\catsrvut\smss.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:524
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\write\explorer.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1084
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\C_10000\conhost.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Documents and Settings\WmiPrvSE.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "lsass" /sc ONLOGON /tr "'C:\PerfLogs\Admin\lsass.exe'" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:552
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kAVfEdbB67.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:892
-
-
C:\Windows\system32\PING.EXEping -n 5 localhost7⤵
- Runs ping.exe
PID:1888
-
-
C:\Windows\System32\C_10000\conhost.exe"C:\Windows\System32\C_10000\conhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5153febc7dc9b8e2841a3a4c0c3ac3205
SHA138528c2c7e19b1246f4f9a420f05d8be3477876e
SHA256cba167b92f87576189504d235e3681496e01fe2a1f090e071a932fda99cb6a5c
SHA512022a6e7c0adeccace5b87ca7d87ba9b695903c5e9a754b9f493991a6c23de1e284c14137fbf266b2a8a50a667025b10b2c4288d6a4d43a064ff006d6984cfbc3
-
Filesize
1.4MB
MD5153febc7dc9b8e2841a3a4c0c3ac3205
SHA138528c2c7e19b1246f4f9a420f05d8be3477876e
SHA256cba167b92f87576189504d235e3681496e01fe2a1f090e071a932fda99cb6a5c
SHA512022a6e7c0adeccace5b87ca7d87ba9b695903c5e9a754b9f493991a6c23de1e284c14137fbf266b2a8a50a667025b10b2c4288d6a4d43a064ff006d6984cfbc3
-
Filesize
205B
MD59389edf1e97cbb671bc399dc7e2a2b18
SHA1f74e44ea2714db0f739771b0c61739da2176d9e8
SHA256effb87d56804a1039a19cd44a0c3939393050c667ac7b4927ce87b33a566daa7
SHA5120f031d2b005bc8ee75398ade5115c84b97d11536cd5b575b4d147d81d947b6b6c5dd971bbfd68026dc810a97f3c36ee66ba863dfb25cb9c13e91beddc26aac8f
-
Filesize
207B
MD5a2902a89edcfaefd1cf9464f23264397
SHA14e452cd28c8b743d0b927f6d8103fed171a549d5
SHA256abd9ed2ebc502da8269778d3b45dd29d2c4ef78fcc5e3e8dd232905cb9625c68
SHA5120db2e9d21164cdb4e824686f39cb4850fdbc8f72dcfd3f3bf73353074e4694a70c04356ce9ffea21e37381388c07943cd489c49a23738ae9a32e4473884dcd55
-
Filesize
30B
MD5987b91a43f4d58b9931af8a8d2d60532
SHA1290b57275dc95a8244d3aab2e76ef5944e64c5d6
SHA2562dafbed48a9bd344ee01d84d4ed7c5e9bc6e271f616e6b16aa0e858ef551472c
SHA512a217b91040d8f1eb67c3092292a6db5da21214b04b8e2d2d5bd13677f84d5552b4fc42710a40915f71db54983b33d83d74e4e1144c6a60cf56d08391c351ceb1
-
Filesize
1.1MB
MD51fe77d2dfb4e5fa383357b76151e6863
SHA1f4d111e26144d496f75ed22139a65513112b125c
SHA2567bb8413b750f8fdd1a58122e11c3fda79b71593f6081f59209981f120180f0b2
SHA512a3829d3683ed5afa341777531e8c24e73d8e506af1eee0904c44404d5d6bb7008b5b1d595af93ab7d9d75e8360fa46eff000621c43c6259364c5653b6f70b4ac
-
Filesize
1.1MB
MD51fe77d2dfb4e5fa383357b76151e6863
SHA1f4d111e26144d496f75ed22139a65513112b125c
SHA2567bb8413b750f8fdd1a58122e11c3fda79b71593f6081f59209981f120180f0b2
SHA512a3829d3683ed5afa341777531e8c24e73d8e506af1eee0904c44404d5d6bb7008b5b1d595af93ab7d9d75e8360fa46eff000621c43c6259364c5653b6f70b4ac
-
Filesize
1.1MB
MD51fe77d2dfb4e5fa383357b76151e6863
SHA1f4d111e26144d496f75ed22139a65513112b125c
SHA2567bb8413b750f8fdd1a58122e11c3fda79b71593f6081f59209981f120180f0b2
SHA512a3829d3683ed5afa341777531e8c24e73d8e506af1eee0904c44404d5d6bb7008b5b1d595af93ab7d9d75e8360fa46eff000621c43c6259364c5653b6f70b4ac
-
Filesize
1.1MB
MD51fe77d2dfb4e5fa383357b76151e6863
SHA1f4d111e26144d496f75ed22139a65513112b125c
SHA2567bb8413b750f8fdd1a58122e11c3fda79b71593f6081f59209981f120180f0b2
SHA512a3829d3683ed5afa341777531e8c24e73d8e506af1eee0904c44404d5d6bb7008b5b1d595af93ab7d9d75e8360fa46eff000621c43c6259364c5653b6f70b4ac
-
Filesize
1.1MB
MD51fe77d2dfb4e5fa383357b76151e6863
SHA1f4d111e26144d496f75ed22139a65513112b125c
SHA2567bb8413b750f8fdd1a58122e11c3fda79b71593f6081f59209981f120180f0b2
SHA512a3829d3683ed5afa341777531e8c24e73d8e506af1eee0904c44404d5d6bb7008b5b1d595af93ab7d9d75e8360fa46eff000621c43c6259364c5653b6f70b4ac