Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    52e0c294963f6cd10e3104901c936a3e

  • Size

    2.0MB

  • Sample

    240111-h2nwraccf5

  • MD5

    52e0c294963f6cd10e3104901c936a3e

  • SHA1

    fa78c9a910b904cfc412cef1b422934243f6f0ff

  • SHA256

    77d8062a27308c826de456d4e430ebcfb9315f87ae792bb23d8f21365c8b4fe7

  • SHA512

    972bb0dbd66f984c41b64c09ff84fef138714929b13db0f03ca2e5257d92664dcf4fcf6d7e6fc99894b664bb9acbbbe5598787a2d10bf4e8d074dfd0487c5f3b

  • SSDEEP

    49152:n0Le0UIxHI38h4kbJA9GOErel2MaHBKljpsREsSSUOmLY5sVQQ:ChJsIJAIMnaHBKcRoOusQ

Malware Config

Targets

    • Target

      52e0c294963f6cd10e3104901c936a3e

    • Size

      2.0MB

    • MD5

      52e0c294963f6cd10e3104901c936a3e

    • SHA1

      fa78c9a910b904cfc412cef1b422934243f6f0ff

    • SHA256

      77d8062a27308c826de456d4e430ebcfb9315f87ae792bb23d8f21365c8b4fe7

    • SHA512

      972bb0dbd66f984c41b64c09ff84fef138714929b13db0f03ca2e5257d92664dcf4fcf6d7e6fc99894b664bb9acbbbe5598787a2d10bf4e8d074dfd0487c5f3b

    • SSDEEP

      49152:n0Le0UIxHI38h4kbJA9GOErel2MaHBKljpsREsSSUOmLY5sVQQ:ChJsIJAIMnaHBKcRoOusQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks