Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 06:36

General

  • Target

    b1e591dc4fa5b6071d9e44760b5dd5d8.exe

  • Size

    1.6MB

  • MD5

    b1e591dc4fa5b6071d9e44760b5dd5d8

  • SHA1

    bfe9909abcacf41e08a8ab59904c0578987c8add

  • SHA256

    774d6ff191fc9d519c07a9ad05e8019d5cf4e0b8961d26fe1d98f69c89516c56

  • SHA512

    f0fd1548d6227bec6ead6f2ec9a3ae5bd1bcb67ab1191cb3eddd97cde74249b4e89a460586a22159f67a31a6e142478f859b9cbf75277278b3c3d810c103c16e

  • SSDEEP

    24576:u2G/nvxW3WieC0zj09QbSqUXJ/mypGc4b0hoc4D9dX1ri36WSmwVZXQxmiHn9vo+:ubA3j0zo9QYnpbZCdXRi36AwVN+n9vo+

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 33 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1e591dc4fa5b6071d9e44760b5dd5d8.exe
    "C:\Users\Admin\AppData\Local\Temp\b1e591dc4fa5b6071d9e44760b5dd5d8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\msProviderWebRuntimebroker\06ie3qFeFZFFjrf0Xu6tbSu.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\msProviderWebRuntimebroker\tLvSU5.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\msProviderWebRuntimebroker\Blocksaves.exe
          "C:\msProviderWebRuntimebroker\Blocksaves.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Program Files\Windows Photo Viewer\Idle.exe
            "C:\Program Files\Windows Photo Viewer\Idle.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2500
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2532
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_32\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2608
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2280
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2116
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2780
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Games\Solitaire\es-ES\explorer.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2920
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Microsoft Games\Solitaire\es-ES\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2528
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Games\Solitaire\es-ES\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Favorites\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2812
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Favorites\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1076
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Favorites\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:112
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "BlocksavesB" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Blocksaves.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1472
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Blocksaves" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Blocksaves.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1732
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "BlocksavesB" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Blocksaves.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\msProviderWebRuntimebroker\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2824
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\msProviderWebRuntimebroker\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:680
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\msProviderWebRuntimebroker\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1168
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:300
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1120
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows NT\TableTextService\en-US\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2268
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Recovery\96f6acc2-489a-11ee-b3cc-62b3d3f2749b\explorer.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:320
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\96f6acc2-489a-11ee-b3cc-62b3d3f2749b\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1632
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Recovery\96f6acc2-489a-11ee-b3cc-62b3d3f2749b\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1236
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\msProviderWebRuntimebroker\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2172
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\msProviderWebRuntimebroker\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2104
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\msProviderWebRuntimebroker\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1212
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\services.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2324
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\es-ES\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2880
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Windows\es-ES\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2328
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2832
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1900
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Games\Solitaire\es-ES\explorer.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • C:\Program Files\Windows Photo Viewer\Idle.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • C:\Program Files\Windows Photo Viewer\Idle.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • C:\msProviderWebRuntimebroker\06ie3qFeFZFFjrf0Xu6tbSu.vbe

    Filesize

    209B

    MD5

    1a33de1f09da3da0d3fa63f5728a2ce4

    SHA1

    e233d890f8e7836273c010b2b14ee9ca7849c403

    SHA256

    c1c35d7e74a317662755a0cbfcc7533ecc81b20a6c3cb9cf1a6e14e0788f03c0

    SHA512

    2789ea0a9bed5ce98b03cf729d79d469a7cb41fde248f5239fa81e09c2462510dd04ea89a90a8b4e8a684dd3efd18ef3d5a90224414ace3eb9ecd8c6015a4009

  • C:\msProviderWebRuntimebroker\Blocksaves.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • C:\msProviderWebRuntimebroker\Blocksaves.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • C:\msProviderWebRuntimebroker\tLvSU5.bat

    Filesize

    46B

    MD5

    3cddef7b59c78d7cde8c2e3ae8ad264e

    SHA1

    15123a72f75f6b7ee6483656191c1d6c7693a8a0

    SHA256

    bb902de2e042081666ee8214d744a8f659f709eda12075cfd93b09a80a61d847

    SHA512

    ccf89cb3ae833021ae4cf6af4619afe187c7731908134170e2289761933b833fbaf430624227d0e3f2df69c070a1eb4dfb78a1d2ea3f9f1b5162e89ecc7af1ba

  • \msProviderWebRuntimebroker\Blocksaves.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • \msProviderWebRuntimebroker\Blocksaves.exe

    Filesize

    1.3MB

    MD5

    0f8046ac2495dcf3e288002921e0535d

    SHA1

    e838e674b1bf232d6b4305973b012fa467537353

    SHA256

    eb86d51548fc3d90e2d566107f6ca429365efd4c1f5a1b239c28cd6763430276

    SHA512

    de355d6247dc733c4dc643815ffb2c3e1f602ec54faf2d54ac941f2fa9f22b21445fa1bc22113ce6040db04e024cf3cfc0119ab6d597f1bb0c435bb6671e777d

  • memory/2204-50-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2204-49-0x00000000008C0000-0x0000000000A12000-memory.dmp

    Filesize

    1.3MB

  • memory/2204-77-0x000000001AFA0000-0x000000001B020000-memory.dmp

    Filesize

    512KB

  • memory/2204-53-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2204-52-0x000000001AFA0000-0x000000001B020000-memory.dmp

    Filesize

    512KB

  • memory/2596-14-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-15-0x000000001B0F0000-0x000000001B170000-memory.dmp

    Filesize

    512KB

  • memory/2596-17-0x00000000004E0000-0x00000000004F6000-memory.dmp

    Filesize

    88KB

  • memory/2596-16-0x0000000000440000-0x000000000045C000-memory.dmp

    Filesize

    112KB

  • memory/2596-13-0x00000000010B0000-0x0000000001202000-memory.dmp

    Filesize

    1.3MB

  • memory/2596-51-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-20-0x0000000000550000-0x0000000000558000-memory.dmp

    Filesize

    32KB

  • memory/2596-19-0x0000000000510000-0x000000000051E000-memory.dmp

    Filesize

    56KB

  • memory/2596-18-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB