Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
01522199.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
01522199.exe
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
01522199.exe
-
Size
800KB
-
MD5
adac3ea10f4ed158473fe3680fc1efb2
-
SHA1
08b6afa1523b959c8c1cbbfd4ad0188ed65956f9
-
SHA256
21f916b721f00ac97997267dfb601165e5718f9253fcf7b07938575c531ccef0
-
SHA512
e41344a67ab71dbe21f5a83a001f264925eea5ead065463d73b81d4ad9c865fd45c820e66536a91e8e2dcfd69393f222c6f81d68a8bed4067611f7a4d881ebad
-
SSDEEP
24576:IK4Sbx1gpQxETtWMrNtKRxU+MBqBPMwsY:Ibm2pQabpQRa+MBqa
Score
10/10
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
resource yara_rule behavioral2/memory/2364-134-0x0000000000400000-0x00000000004A4000-memory.dmp dcrat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4652 set thread context of 2364 4652 01522199.exe 85 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe 2364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4652 wrote to memory of 2364 4652 01522199.exe 85 PID 4652 wrote to memory of 2364 4652 01522199.exe 85 PID 4652 wrote to memory of 2364 4652 01522199.exe 85 PID 4652 wrote to memory of 2364 4652 01522199.exe 85 PID 4652 wrote to memory of 2364 4652 01522199.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\01522199.exe"C:\Users\Admin\AppData\Local\Temp\01522199.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-