Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
312s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 03:45
Behavioral task
behavioral1
Sample
eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe
Resource
win7-20230712-en
General
-
Target
eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe
-
Size
1.6MB
-
MD5
cd4ee1a7a160a3c103e775ec9136f10a
-
SHA1
53bedd6edbba3e0a56268362b3451e9a1fdc1627
-
SHA256
eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a
-
SHA512
220101710ac33527532d1b1c153ce8bd477b3b7a282fbb1a5e3139b8cd5f064fee305ef16b77b228970ce31cc378c3e9cdb57def29f36b978a4ba7f362db5d59
-
SSDEEP
24576:T2G/nvxW3WjfexVOsf1916TKXVF6A/fIreiReAqzEqB+qLzqb3nxBzP4U1xg:TbA3Gn6L9QeVAqzEqPOFBzPXu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4476 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3888 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3588 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 924 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2140 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 164 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 212 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 528 396 schtasks.exe 74 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3084 396 schtasks.exe 74 -
resource yara_rule behavioral2/files/0x000600000001af8d-133.dat dcrat behavioral2/files/0x000600000001af8d-135.dat dcrat behavioral2/memory/4292-136-0x0000000000E00000-0x0000000000F52000-memory.dmp dcrat behavioral2/files/0x000600000001af90-148.dat dcrat behavioral2/files/0x000600000001af90-163.dat dcrat behavioral2/files/0x000600000001af90-165.dat dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 4292 BlockPerfmonitor.exe 4412 Idle.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ELAMBKUP\sppsvc.exe BlockPerfmonitor.exe File created C:\Windows\ELAMBKUP\0a1fd5f707cd16 BlockPerfmonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 164 schtasks.exe 212 schtasks.exe 4136 schtasks.exe 1804 schtasks.exe 4476 schtasks.exe 1480 schtasks.exe 3888 schtasks.exe 3588 schtasks.exe 924 schtasks.exe 3084 schtasks.exe 1888 schtasks.exe 4976 schtasks.exe 5056 schtasks.exe 528 schtasks.exe 2140 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000_Classes\Local Settings eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000_Classes\Local Settings BlockPerfmonitor.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4308 reg.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4292 BlockPerfmonitor.exe 4292 BlockPerfmonitor.exe 4292 BlockPerfmonitor.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe 4412 Idle.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4412 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4292 BlockPerfmonitor.exe Token: SeDebugPrivilege 4412 Idle.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4428 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 69 PID 3044 wrote to memory of 4428 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 69 PID 3044 wrote to memory of 4428 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 69 PID 3044 wrote to memory of 3776 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 70 PID 3044 wrote to memory of 3776 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 70 PID 3044 wrote to memory of 3776 3044 eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe 70 PID 4428 wrote to memory of 3616 4428 WScript.exe 71 PID 4428 wrote to memory of 3616 4428 WScript.exe 71 PID 4428 wrote to memory of 3616 4428 WScript.exe 71 PID 3616 wrote to memory of 4292 3616 cmd.exe 73 PID 3616 wrote to memory of 4292 3616 cmd.exe 73 PID 4292 wrote to memory of 2280 4292 BlockPerfmonitor.exe 90 PID 4292 wrote to memory of 2280 4292 BlockPerfmonitor.exe 90 PID 2280 wrote to memory of 3532 2280 cmd.exe 92 PID 2280 wrote to memory of 3532 2280 cmd.exe 92 PID 3616 wrote to memory of 4308 3616 cmd.exe 93 PID 3616 wrote to memory of 4308 3616 cmd.exe 93 PID 3616 wrote to memory of 4308 3616 cmd.exe 93 PID 2280 wrote to memory of 4412 2280 cmd.exe 94 PID 2280 wrote to memory of 4412 2280 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe"C:\Users\Admin\AppData\Local\Temp\eb058bb526ec0e8b9d477425af771f9c13dd68ed6a120ac19d8920403253326a.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MscomSurrogatebrokerCrt\bCHfvnOhpBFuYP7qZ.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\MscomSurrogatebrokerCrt\zIFGDdD.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\MscomSurrogatebrokerCrt\BlockPerfmonitor.exe"C:\MscomSurrogatebrokerCrt\BlockPerfmonitor.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JigN4PJfPZ.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:3532
-
-
C:\MscomSurrogatebrokerCrt\Idle.exe"C:\MscomSurrogatebrokerCrt\Idle.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:4308
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MscomSurrogatebrokerCrt\file.vbs"2⤵PID:3776
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\MscomSurrogatebrokerCrt\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MscomSurrogatebrokerCrt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\MscomSurrogatebrokerCrt\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\MscomSurrogatebrokerCrt\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MscomSurrogatebrokerCrt\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\MscomSurrogatebrokerCrt\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\odt\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:164
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\odt\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Windows\ELAMBKUP\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\ELAMBKUP\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Windows\ELAMBKUP\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58d9bb44ab073997b8a010e84a3689d67
SHA1f2c56a1bc31106556f50f17d6ca807861c20e778
SHA256dee537c42e982f63dd054631f3a34f12ad7bafc92ae2bfb23c21f209cee08048
SHA5120b6cfd046e170413798f00ad21d91342209dd674c14cf618ebb3826bdea755ce77328ed4ffd969729502e3d75ea80bc2312a59f735dbe216aeb5c395886e0e52
-
Filesize
1.3MB
MD58d9bb44ab073997b8a010e84a3689d67
SHA1f2c56a1bc31106556f50f17d6ca807861c20e778
SHA256dee537c42e982f63dd054631f3a34f12ad7bafc92ae2bfb23c21f209cee08048
SHA5120b6cfd046e170413798f00ad21d91342209dd674c14cf618ebb3826bdea755ce77328ed4ffd969729502e3d75ea80bc2312a59f735dbe216aeb5c395886e0e52
-
Filesize
1.3MB
MD58d9bb44ab073997b8a010e84a3689d67
SHA1f2c56a1bc31106556f50f17d6ca807861c20e778
SHA256dee537c42e982f63dd054631f3a34f12ad7bafc92ae2bfb23c21f209cee08048
SHA5120b6cfd046e170413798f00ad21d91342209dd674c14cf618ebb3826bdea755ce77328ed4ffd969729502e3d75ea80bc2312a59f735dbe216aeb5c395886e0e52
-
Filesize
1.3MB
MD58d9bb44ab073997b8a010e84a3689d67
SHA1f2c56a1bc31106556f50f17d6ca807861c20e778
SHA256dee537c42e982f63dd054631f3a34f12ad7bafc92ae2bfb23c21f209cee08048
SHA5120b6cfd046e170413798f00ad21d91342209dd674c14cf618ebb3826bdea755ce77328ed4ffd969729502e3d75ea80bc2312a59f735dbe216aeb5c395886e0e52
-
Filesize
1.3MB
MD58d9bb44ab073997b8a010e84a3689d67
SHA1f2c56a1bc31106556f50f17d6ca807861c20e778
SHA256dee537c42e982f63dd054631f3a34f12ad7bafc92ae2bfb23c21f209cee08048
SHA5120b6cfd046e170413798f00ad21d91342209dd674c14cf618ebb3826bdea755ce77328ed4ffd969729502e3d75ea80bc2312a59f735dbe216aeb5c395886e0e52
-
Filesize
207B
MD595ced681f6ed091e814560cfd6263b67
SHA15ce23afdddf770d7db461d949be98bafdad7927d
SHA256acaf58fd6f360831e6af609791bea73077ffe1b976b28fd8d7640f2a63be783a
SHA512d2ef86bd18da42befe83fa3e06857303f43c39cc9b1bd4a887f2839c948966a5f953b390a2c27733b60acf3a62191bcd8d41a513f36816ce268995362e997b91
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
161B
MD5ae30d28aebaf9f4d8e0f0a5322a49a9c
SHA199096c4cb201ebe50adf30ce7849fac2d424f634
SHA256aeabc11a80ec4da62577d0e529009cbf15d5258ca5fb3f0bfcc07ca472699f8d
SHA512234db49cb976a1487286efdc4d53964188bab6766d37ab0676a86c91c00e942c5ed98f4facc4d629b5efaa8f8b33bbc781675e148279bff81b0ac7c2c764caf5
-
Filesize
200B
MD5c087e21b716836e8029e832914fffb6a
SHA12b3641af089ea3191d1dea4693110998a2744917
SHA256443726e08be61059c26d5e942f0c52a9963dd6a809a9d2085aa43f778be97607
SHA51215809eb839be243844dde28c2d241aa89c4f5663f1dc63403bee145a31dcc06b070ffe30e71e1431f021d9dbd03e6754ce93028092e90dcd418da85215106fe7