Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe

  • Size

    46.5MB

  • Sample

    240527-bjw13sah31

  • MD5

    236b78f3cd3a0b771d318f044dda8f45

  • SHA1

    f890ca2ffb6218fa01df6844fe2a51b184e912b8

  • SHA256

    8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a

  • SHA512

    8c6f2131f7566d64a5a8973cf4a3bad7d733e02d098326f30ec4f88785237c26d7361acfc674de084997356d2bb082ea8ec14b7ac4485fa63102b40c2dcb3d1e

  • SSDEEP

    786432:uNu/WmUoEqtPbDiTr+LykgDYGUvqptKaQ393283Ka3rPJHE2NOAsh8bOC:vUoEqtfiTAIldpt435x3rjs2qC

Malware Config

Targets

    • Target

      8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a.exe

    • Size

      46.5MB

    • MD5

      236b78f3cd3a0b771d318f044dda8f45

    • SHA1

      f890ca2ffb6218fa01df6844fe2a51b184e912b8

    • SHA256

      8342c29aacd500b5d424822648331736379f18bdb6bc27a7e7a579544570fa8a

    • SHA512

      8c6f2131f7566d64a5a8973cf4a3bad7d733e02d098326f30ec4f88785237c26d7361acfc674de084997356d2bb082ea8ec14b7ac4485fa63102b40c2dcb3d1e

    • SSDEEP

      786432:uNu/WmUoEqtPbDiTr+LykgDYGUvqptKaQ393283Ka3rPJHE2NOAsh8bOC:vUoEqtfiTAIldpt435x3rjs2qC

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detects executables packed with SmartAssembly

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks