Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe
-
Size
46.5MB
-
Sample
240527-bjw13sah31
-
MD5
236b78f3cd3a0b771d318f044dda8f45
-
SHA1
f890ca2ffb6218fa01df6844fe2a51b184e912b8
-
SHA256
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a
-
SHA512
8c6f2131f7566d64a5a8973cf4a3bad7d733e02d098326f30ec4f88785237c26d7361acfc674de084997356d2bb082ea8ec14b7ac4485fa63102b40c2dcb3d1e
-
SSDEEP
786432:uNu/WmUoEqtPbDiTr+LykgDYGUvqptKaQ393283Ka3rPJHE2NOAsh8bOC:vUoEqtfiTAIldpt435x3rjs2qC
Behavioral task
behavioral1
Sample
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe
-
Size
46.5MB
-
MD5
236b78f3cd3a0b771d318f044dda8f45
-
SHA1
f890ca2ffb6218fa01df6844fe2a51b184e912b8
-
SHA256
8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a
-
SHA512
8c6f2131f7566d64a5a8973cf4a3bad7d733e02d098326f30ec4f88785237c26d7361acfc674de084997356d2bb082ea8ec14b7ac4485fa63102b40c2dcb3d1e
-
SSDEEP
786432:uNu/WmUoEqtPbDiTr+LykgDYGUvqptKaQ393283Ka3rPJHE2NOAsh8bOC:vUoEqtfiTAIldpt435x3rjs2qC
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with SmartAssembly
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1