Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/10/2024, 06:30

241030-g9zgsaycjm 10

05/04/2023, 14:51

230405-r75wwshd6w 10

Analysis

  • max time kernel
    114s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2023, 14:51

General

  • Target

    a26ae5eb4e86ca54a1d338220318c43b.exe

  • Size

    321KB

  • MD5

    a26ae5eb4e86ca54a1d338220318c43b

  • SHA1

    ba66b537f8b7289acf611e67e1f3b20fb5bb48db

  • SHA256

    fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

  • SHA512

    0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

  • SSDEEP

    6144:1RmCttlxSX8YOKPnzxx7YyRRYz4OjnYDh+OHYQmrBQ4rQbFZUzEo1V:vmJMYt/czYDh+OOQMQbT

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a26ae5eb4e86ca54a1d338220318c43b.exe
    "C:\Users\Admin\AppData\Local\Temp\a26ae5eb4e86ca54a1d338220318c43b.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\a26ae5eb4e86ca54a1d338220318c43b.exe
      "C:\Users\Admin\AppData\Local\Temp\a26ae5eb4e86ca54a1d338220318c43b.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe
        "C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:300
          • C:\Windows\SysWOW64\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:336
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1688
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1120
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\PLA\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1964
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Windows\PLA\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:640
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Program Files\Internet Explorer\images\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\images\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1916
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Program Files\Internet Explorer\images\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1092
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\Rules\en-US\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\PLA\Rules\en-US\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1888
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Windows\PLA\Rules\en-US\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1880
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1696
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\lsass.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1256
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\lsass.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1420
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1596
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1676
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Media Player\Network Sharing\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1704
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Network Sharing\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1072
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\Network Sharing\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1936
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1820
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "a26ae5eb4e86ca54a1d338220318c43b" /f
      1⤵
      • Process spawned unexpected child process
      PID:1996
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "a26ae5eb4e86ca54a1d338220318c43ba" /f
      1⤵
      • Process spawned unexpected child process
      PID:2040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "lsass" /f
      1⤵
      • Process spawned unexpected child process
      PID:1888
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "lsassl" /f
      1⤵
      • Process spawned unexpected child process
      PID:708
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "Idle" /f
      1⤵
      • Process spawned unexpected child process
      PID:568
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "IdleI" /f
      1⤵
      • Process spawned unexpected child process
      PID:1500
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "taskhost" /f
      1⤵
      • Process spawned unexpected child process
      PID:1724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "taskhostt" /f
      1⤵
      • Process spawned unexpected child process
      PID:1124
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "Idle" /f
      1⤵
      • Process spawned unexpected child process
      PID:1572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "IdleI" /f
      1⤵
      • Process spawned unexpected child process
      PID:540
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "Idle" /f
      1⤵
      • Process spawned unexpected child process
      PID:1712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /delete /tn "IdleI" /f
      1⤵
      • Process spawned unexpected child process
      PID:836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\6ccacd8608530f

      Filesize

      629B

      MD5

      3eb774bb6e5e4a9835fd959c11c978af

      SHA1

      f66469e8076bd342c2299427b186b50fb9f70fdf

      SHA256

      00fe11debc2e6f425ffad932301c0897eb4f6e3f92e2d1daecde95aeb389886a

      SHA512

      a9229d484adf7e11654b0a6c99dfff2093f6e60587d04de0d53c29574f4cbf360eeb6ee71f52ed6a77d6c9c6c2641a6cd1d2e4f0dc0bcc64452a8e34862e1795

    • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\Idle.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Program Files\Windows Media Player\Network Sharing\b75386f1303e64

      Filesize

      873B

      MD5

      b5ff98415b8c67ec2767948559fd6f03

      SHA1

      8afe2d812280b1479aa0b40b27137855e8632289

      SHA256

      5fdc5fa825a540834b281ae0b358e6b1f63f97898c8bb448320b5daba17e3a6d

      SHA512

      852bd749576e171e8bf26355f20d086bcaf41c67028eb2e4bba53679479e59f495bfb92b9212383a310cb52e5e01582ecd2e7639876afbb677040ca2527070b2

    • C:\Program Files\Windows Media Player\Network Sharing\taskhost.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\6203df4a6bafc7

      Filesize

      171B

      MD5

      b69302340b37e76e74de8d4109602041

      SHA1

      4bee9f75b6da8e61d6e65ad870863a287233be09

      SHA256

      3d9b4f3d953752987c4786aedddd4becff9ae0b8d54fd22ce288644a2c71cb79

      SHA512

      d2f9234cb78da4b48df5dedd5806580f8ac09e5321a242deb648f68a9715652810d0717a93adced03749c4a7123fedc176999420d1ce751f479a959a2082b02e

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\6ccacd8608530f

      Filesize

      564B

      MD5

      5da69b9322ea31c0ea607b09226235c5

      SHA1

      6369954872e29cb5008b31d2c86719715bf2235f

      SHA256

      9fcce6b17470426b1eb06e5f10d49a01f8094c96d4d3692846f2727fd37cc38b

      SHA512

      2ca1d8a7277fa4514731049686468f04ae017630eb5376d847ce4890836e35ec71dd09e52fce708e979b28bbcdfa0a6015db7c7c9e5d6275f723c629f649e667

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\lsass.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\lsass.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat

      Filesize

      306B

      MD5

      d56e3c754e4aae93b45349cee7b36926

      SHA1

      32f21bbdb6ca78fdb7ce7f6583d94a7762de9e7b

      SHA256

      32aeaf06e325c898a57d59618ba4b91b8bde6a31608fa27ce9bcc77780517920

      SHA512

      0820f3a1dc972ce9c8267674b2736112a04dbd35ed5620629d7844a39c70c82e17f39e82520c9955397df3f0b4f25111dadf1e3086a2c341d54d202a4cbf802b

    • C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat

      Filesize

      306B

      MD5

      d56e3c754e4aae93b45349cee7b36926

      SHA1

      32f21bbdb6ca78fdb7ce7f6583d94a7762de9e7b

      SHA256

      32aeaf06e325c898a57d59618ba4b91b8bde6a31608fa27ce9bcc77780517920

      SHA512

      0820f3a1dc972ce9c8267674b2736112a04dbd35ed5620629d7844a39c70c82e17f39e82520c9955397df3f0b4f25111dadf1e3086a2c341d54d202a4cbf802b

    • \Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\Idle.exe

      Filesize

      321KB

      MD5

      a26ae5eb4e86ca54a1d338220318c43b

      SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

      SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

      SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • memory/852-81-0x0000000000CF0000-0x0000000000D46000-memory.dmp

      Filesize

      344KB

    • memory/852-82-0x0000000004BC0000-0x0000000004C00000-memory.dmp

      Filesize

      256KB

    • memory/852-83-0x0000000004BC0000-0x0000000004C00000-memory.dmp

      Filesize

      256KB

    • memory/992-66-0x0000000004A80000-0x0000000004AC0000-memory.dmp

      Filesize

      256KB

    • memory/1700-54-0x0000000000350000-0x00000000003A6000-memory.dmp

      Filesize

      344KB

    • memory/1700-57-0x0000000000870000-0x00000000008C6000-memory.dmp

      Filesize

      344KB

    • memory/1700-56-0x0000000004910000-0x0000000004950000-memory.dmp

      Filesize

      256KB

    • memory/1700-55-0x0000000006E00000-0x0000000006EDC000-memory.dmp

      Filesize

      880KB