Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 19:14
Behavioral task
behavioral1
Sample
buildchecker1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
buildchecker1.exe
Resource
win10v2004-20240709-en
General
-
Target
buildchecker1.exe
-
Size
1.1MB
-
MD5
ee4839dcc8cf148ce959f4d238f5d696
-
SHA1
ea27026af975bf81febf24f872b722c19544c0be
-
SHA256
e0663c567d2eb0a820e22f4f2cf2a728c911e14dbb5aa054e6d24904b4e3ca4e
-
SHA512
65cbba7b3c2f89a95a38e9e21386084d6fb57162ed34010feae03cb00051537663cfc78475810b123427db6e063a53a9b08170f5aed869d34fd4295c84021093
-
SSDEEP
12288:aRZ+IoG/n9IQxW3OBsee2X+t4Rbi0tJzEkissVIoXor9ayjhvegiVW9mSYG1sP+c:U2G/nvxW3Ww0tFwkismobjwSYGqAa
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2216 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2032 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 2760 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 2760 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000018736-10.dat dcrat behavioral1/memory/1964-13-0x0000000000F60000-0x0000000001036000-memory.dmp dcrat behavioral1/memory/1720-33-0x0000000001340000-0x0000000001416000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 1964 bridgecontainerRef.exe 1720 Idle.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 cmd.exe 2928 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe bridgecontainerRef.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\56085415360792 bridgecontainerRef.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\debug\WIA\System.exe bridgecontainerRef.exe File created C:\Windows\debug\WIA\27d1bcfc3c54e0 bridgecontainerRef.exe File created C:\Windows\ServiceProfiles\NetworkService\Videos\wininit.exe bridgecontainerRef.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\Videos\wininit.exe bridgecontainerRef.exe File created C:\Windows\ServiceProfiles\NetworkService\Videos\56085415360792 bridgecontainerRef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buildchecker1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe 1568 schtasks.exe 1756 schtasks.exe 2856 schtasks.exe 2712 schtasks.exe 1532 schtasks.exe 2592 schtasks.exe 2216 schtasks.exe 1940 schtasks.exe 1736 schtasks.exe 2904 schtasks.exe 2796 schtasks.exe 2740 schtasks.exe 2720 schtasks.exe 1428 schtasks.exe 1980 schtasks.exe 2032 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1964 bridgecontainerRef.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe 1720 Idle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1964 bridgecontainerRef.exe Token: SeDebugPrivilege 1720 Idle.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2320 2968 buildchecker1.exe 30 PID 2968 wrote to memory of 2320 2968 buildchecker1.exe 30 PID 2968 wrote to memory of 2320 2968 buildchecker1.exe 30 PID 2968 wrote to memory of 2320 2968 buildchecker1.exe 30 PID 2320 wrote to memory of 2928 2320 WScript.exe 32 PID 2320 wrote to memory of 2928 2320 WScript.exe 32 PID 2320 wrote to memory of 2928 2320 WScript.exe 32 PID 2320 wrote to memory of 2928 2320 WScript.exe 32 PID 2928 wrote to memory of 1964 2928 cmd.exe 34 PID 2928 wrote to memory of 1964 2928 cmd.exe 34 PID 2928 wrote to memory of 1964 2928 cmd.exe 34 PID 2928 wrote to memory of 1964 2928 cmd.exe 34 PID 1964 wrote to memory of 1988 1964 bridgecontainerRef.exe 54 PID 1964 wrote to memory of 1988 1964 bridgecontainerRef.exe 54 PID 1964 wrote to memory of 1988 1964 bridgecontainerRef.exe 54 PID 1988 wrote to memory of 1920 1988 cmd.exe 56 PID 1988 wrote to memory of 1920 1988 cmd.exe 56 PID 1988 wrote to memory of 1920 1988 cmd.exe 56 PID 1988 wrote to memory of 1720 1988 cmd.exe 57 PID 1988 wrote to memory of 1720 1988 cmd.exe 57 PID 1988 wrote to memory of 1720 1988 cmd.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\buildchecker1.exe"C:\Users\Admin\AppData\Local\Temp\buildchecker1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Containernet\r3KdEjt.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Containernet\RF2hvkHZrszbP0k.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Containernet\bridgecontainerRef.exe"C:\Containernet\bridgecontainerRef.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ITcwZ43zXP.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1920
-
-
C:\MSOCache\All Users\Idle.exe"C:\MSOCache\All Users\Idle.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Windows\ServiceProfiles\NetworkService\Videos\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\Videos\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Windows\ServiceProfiles\NetworkService\Videos\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Containernet\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Containernet\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Containernet\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\debug\WIA\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\debug\WIA\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Windows\debug\WIA\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2032
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Recovery\2b7a8ca2-3d6d-11ef-81ce-f2a3cf4ad94f\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\2b7a8ca2-3d6d-11ef-81ce-f2a3cf4ad94f\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Recovery\2b7a8ca2-3d6d-11ef-81ce-f2a3cf4ad94f\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5a85467e4f1d1f99e96e9590c355d42f2
SHA1398ac3ea16a11a8a2957a5ef4143d472e5cfc294
SHA256046e64c151f66ef0f72682fa16c83309790478eeaa0d7621ea324b4221e85903
SHA5121a718a6040863d596326d1a7e0f81307d69d1287c4b03767f1a83ebf31f860b3e2a545b44f358a47cac4500b4ecdf9e9c15f8ec46de7335606eaa72b7eaf672a
-
Filesize
828KB
MD56afa3e281b7634f49b96825bb400bc5a
SHA1fee8aa25a2db0a2eec530345a3955ab5c16050bf
SHA25629e76ed158c096cd29f1b2d5fcfc838e1034ca2ea35ed66c51490f9bf409a7b1
SHA512913cecf27e7b99c2b0326c1647a25ce71dd31af8f4e1854b6dc4acd4f87125455b7288b7f9e59d44512bc713a0e2941ddcf6395922af011a3aa71fb48ae2e605
-
Filesize
204B
MD58952fed62096fc946fc4ff2231ae0277
SHA1437591c439dc3da24fbb7ca97cc57e2b37027183
SHA25654c44a2c1291a654f1fe103fb47ba51e164a7d36221b28282ec01eba06ec5aa4
SHA5125fd0750db4a66187736760347987108ba81caa3771d8c20dee3fec57b133c1b5b892a65c3e78b6e88958c308d7e98011ac4cb6af63c345b29882f72f75de3d12
-
Filesize
195B
MD582b349e0e3b1cfe75888a22dd6e6e88a
SHA16194c63498b1f4d4621576a2982ffcc2c7372b78
SHA256853ed580710cdd3d9fc596c4cbdd657bb5e778faff92a3d394d6e32dafd3b3e0
SHA5122cfcfee7fef756fac94b3b6307cb8cd19550ea1f505fa493dd754cc38165d9d94ca39305ca21752b10f57b5c27b5eb9cc7eee475cfda45e40e70216f43338deb