Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/11/2023, 19:12
231117-xwf2aaeb6w 1013/11/2023, 20:48
231113-zlyjpafe33 1011/11/2023, 00:27
231111-asanrsce88 1026/10/2023, 01:21
231026-bqq4eaae92 1017/10/2023, 19:09
231017-xt332ahd24 1014/10/2023, 18:16
231014-wwjlqsgc23 1008/10/2023, 21:51
231008-1qgmeagc31 1003/10/2023, 17:46
231003-wckppaed21 10General
-
Target
New Text Document.exe
-
Size
4KB
-
Sample
231111-asanrsce88
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.exe
Resource
win10-20231020-en
Malware Config
Extracted
formbook
4.1
ge06
azaharparis.com
nationaleventsafety.com
covesstudy.com
quinshon4.com
moderco.net
trailblazerbaby.com
time-edu.net
azeemtourism.com
anakmedan3.click
bookinternationaltours.com
ulksht.top
newswirex.com
dingg.net
waveoflife.pro
miamirealestatecommercial.com
rtplive77.xyz
bowllywood.com
automation-tools-84162.bond
booptee.com
ebx.lat
gdlongzhong.icu
seoulbeautytw.com
bulgarianarchive.com
pojipoji.com
mochibees-wylie.com
ecoboat.world
eroyfw.top
centralngs.com
youtube-manager.site
eatlust.com
geutik.cfd
credit-cards-16215.bond
lodsoab.com
jon188.ink
52iwin.win
juanmafit.com
gamemuggaz.com
oneresi.com
pj69vip12.cyou
west-paws.com
chaineccn.com
mentiti.com
modeparisiennefr.com
skyboxpro.net
versebuild.xyz
luxpsy.com
nivaarnalawgroup.com
c091627.com
preppal.shop
narrativepages.com
yqsoysy.com
diverseindiatours.com
batcavela.com
ayyp300.top
daqtpt.cfd
livers-guardplus.com
chucobuilt.net
qianxz109.xyz
carat-automotive.com
hndswicco.best
workwithray.live
sxchenggu.com
sanpan010.com
fufe066.xyz
fakeittilyoumakeitfinance.com
Targets
-
-
Target
New Text Document.exe
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect ZGRat V1
-
Formbook payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
6