Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 01:42

General

  • Target

    c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe

  • Size

    2.3MB

  • MD5

    499f14a1e407d82bac24d6ac62b1f7ee

  • SHA1

    f6c0cbae4795f6c0590fa6db2da41a70f840cec6

  • SHA256

    c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693

  • SHA512

    72701089d14891d69ba46c44fbf38e98011313271971c4ba4b2044ae375bcf8474098b1d17a7823ee4afc4c495e27b76a38741fe6ad33252232671a2e094b07b

  • SSDEEP

    24576:NY5J0GMnewFiryL/VSXXn++KN5BGbLPv0LfQceR9EqbIlHgzVEPRA8ElB/p3FIrx:NYj0obkY1XifQ7RHbJK+8qrIrufZTpI

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe
    "C:\Users\Admin\AppData\Local\Temp\c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe
      "C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1852
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\SendTo\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3648
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1172
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\SendTo\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2864
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3116
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2040
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4648
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693c" /sc MINUTE /mo 5 /tr "'C:\Users\Default\c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1672
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693" /sc ONLOGON /tr "'C:\Users\Default\c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693c" /sc MINUTE /mo 11 /tr "'C:\Users\Default\c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Sidebar\Gadgets\RuntimeBroker.exe

    Filesize

    2.3MB

    MD5

    499f14a1e407d82bac24d6ac62b1f7ee

    SHA1

    f6c0cbae4795f6c0590fa6db2da41a70f840cec6

    SHA256

    c7d5c20a8f8704cd72855276ade10f22dc95cbce0d89aedcaab2ad64a8753693

    SHA512

    72701089d14891d69ba46c44fbf38e98011313271971c4ba4b2044ae375bcf8474098b1d17a7823ee4afc4c495e27b76a38741fe6ad33252232671a2e094b07b

  • memory/528-6-0x000000001BA00000-0x000000001BA56000-memory.dmp

    Filesize

    344KB

  • memory/528-9-0x0000000003210000-0x000000000321E000-memory.dmp

    Filesize

    56KB

  • memory/528-3-0x0000000003030000-0x000000000304C000-memory.dmp

    Filesize

    112KB

  • memory/528-0-0x00007FFE00E93000-0x00007FFE00E95000-memory.dmp

    Filesize

    8KB

  • memory/528-5-0x0000000003170000-0x0000000003186000-memory.dmp

    Filesize

    88KB

  • memory/528-4-0x00000000031C0000-0x0000000003210000-memory.dmp

    Filesize

    320KB

  • memory/528-2-0x00007FFE00E90000-0x00007FFE01951000-memory.dmp

    Filesize

    10.8MB

  • memory/528-11-0x000000001BA50000-0x000000001BA58000-memory.dmp

    Filesize

    32KB

  • memory/528-7-0x0000000003190000-0x00000000031A2000-memory.dmp

    Filesize

    72KB

  • memory/528-10-0x0000000003220000-0x0000000003228000-memory.dmp

    Filesize

    32KB

  • memory/528-8-0x000000001CAB0000-0x000000001CFD8000-memory.dmp

    Filesize

    5.2MB

  • memory/528-1-0x0000000000BD0000-0x0000000000E22000-memory.dmp

    Filesize

    2.3MB

  • memory/528-29-0x00007FFE00E90000-0x00007FFE01951000-memory.dmp

    Filesize

    10.8MB

  • memory/1852-30-0x000000001D300000-0x000000001D356000-memory.dmp

    Filesize

    344KB

  • memory/1852-31-0x000000001BFF0000-0x000000001C002000-memory.dmp

    Filesize

    72KB