Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 19:39

General

  • Target

    7609a834c94e791232efcf7fe8fe7df0_exe32.exe

  • Size

    783KB

  • MD5

    7609a834c94e791232efcf7fe8fe7df0

  • SHA1

    d1d3e1755f5d4d264a7d5cf2fdb6f0bcd3afc61f

  • SHA256

    b155894733ade318a1448d83f693806ed14dec0378d03513ecab33971106a4ab

  • SHA512

    f093b654517987cd3c2d4576e0af7ac0eb5d917967ceab42f1cc5e2d0a14d731c54f6e32d24dcf052ffb2c7970fd3a7b7ff42d08d738dd8fdad05fb458e6a8b8

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 3 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7609a834c94e791232efcf7fe8fe7df0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\7609a834c94e791232efcf7fe8fe7df0_exe32.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SIHClient" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SIHClient.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4400
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\odt\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2172
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\perfd00A\SppExtComObj.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2964
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\SppExtComObj\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3836
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost\StartMenuExperienceHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\odt\TextInputHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost\StartMenuExperienceHost.exe

    Filesize

    783KB

    MD5

    7609a834c94e791232efcf7fe8fe7df0

    SHA1

    d1d3e1755f5d4d264a7d5cf2fdb6f0bcd3afc61f

    SHA256

    b155894733ade318a1448d83f693806ed14dec0378d03513ecab33971106a4ab

    SHA512

    f093b654517987cd3c2d4576e0af7ac0eb5d917967ceab42f1cc5e2d0a14d731c54f6e32d24dcf052ffb2c7970fd3a7b7ff42d08d738dd8fdad05fb458e6a8b8

  • memory/2744-14-0x0000000002DC0000-0x0000000002DC8000-memory.dmp

    Filesize

    32KB

  • memory/2744-24-0x0000000002E50000-0x0000000002E58000-memory.dmp

    Filesize

    32KB

  • memory/2744-3-0x0000000002C10000-0x0000000002C18000-memory.dmp

    Filesize

    32KB

  • memory/2744-4-0x0000000002C20000-0x0000000002C28000-memory.dmp

    Filesize

    32KB

  • memory/2744-15-0x0000000002DE0000-0x0000000002DE8000-memory.dmp

    Filesize

    32KB

  • memory/2744-6-0x0000000002C70000-0x0000000002C78000-memory.dmp

    Filesize

    32KB

  • memory/2744-7-0x0000000002C40000-0x0000000002C4C000-memory.dmp

    Filesize

    48KB

  • memory/2744-8-0x0000000002C60000-0x0000000002C6A000-memory.dmp

    Filesize

    40KB

  • memory/2744-9-0x0000000002C90000-0x0000000002C9A000-memory.dmp

    Filesize

    40KB

  • memory/2744-10-0x0000000002C80000-0x0000000002C88000-memory.dmp

    Filesize

    32KB

  • memory/2744-11-0x0000000002C50000-0x0000000002C58000-memory.dmp

    Filesize

    32KB

  • memory/2744-12-0x0000000002CA0000-0x0000000002CA8000-memory.dmp

    Filesize

    32KB

  • memory/2744-2-0x000000001B9A0000-0x000000001B9B0000-memory.dmp

    Filesize

    64KB

  • memory/2744-13-0x0000000002DD0000-0x0000000002DD8000-memory.dmp

    Filesize

    32KB

  • memory/2744-5-0x0000000002C30000-0x0000000002C40000-memory.dmp

    Filesize

    64KB

  • memory/2744-16-0x0000000002DF0000-0x0000000002DF8000-memory.dmp

    Filesize

    32KB

  • memory/2744-17-0x0000000002E00000-0x0000000002E08000-memory.dmp

    Filesize

    32KB

  • memory/2744-18-0x0000000002E10000-0x0000000002E18000-memory.dmp

    Filesize

    32KB

  • memory/2744-19-0x0000000002E40000-0x0000000002E48000-memory.dmp

    Filesize

    32KB

  • memory/2744-20-0x0000000002E20000-0x0000000002E28000-memory.dmp

    Filesize

    32KB

  • memory/2744-23-0x0000000002E30000-0x0000000002E3C000-memory.dmp

    Filesize

    48KB

  • memory/2744-22-0x000000001B9A0000-0x000000001B9B0000-memory.dmp

    Filesize

    64KB

  • memory/2744-21-0x000000001B9A0000-0x000000001B9B0000-memory.dmp

    Filesize

    64KB

  • memory/2744-0-0x0000000000AF0000-0x0000000000BBA000-memory.dmp

    Filesize

    808KB

  • memory/2744-29-0x000000001B9A0000-0x000000001B9B0000-memory.dmp

    Filesize

    64KB

  • memory/2744-1-0x00007FF8D56E0000-0x00007FF8D61A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2744-41-0x000000001B9A0000-0x000000001B9B0000-memory.dmp

    Filesize

    64KB

  • memory/2744-54-0x00007FF8D56E0000-0x00007FF8D61A1000-memory.dmp

    Filesize

    10.8MB