Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 21:38
Behavioral task
behavioral1
Sample
7e8d92bf51d41fd9244051c68f98c660N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7e8d92bf51d41fd9244051c68f98c660N.exe
Resource
win10v2004-20240802-en
General
-
Target
7e8d92bf51d41fd9244051c68f98c660N.exe
-
Size
783KB
-
MD5
7e8d92bf51d41fd9244051c68f98c660
-
SHA1
f7ac88a58fd24243402e8f1e454fdd08ec2c3a82
-
SHA256
27907524a6f24a23303903dd2f8a230cc020401ec15e0f9579dd2c11a5c92a3a
-
SHA512
31b4357c81f32661558e5692a005e87d7642f9345474af1c46ba22f8856660fce87a9d662ea53dea13719c125666f9a5c00dc6c4825015de3ab7b6e22459ba58
-
SSDEEP
12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4212 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 4212 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 4212 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3956 4212 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 4212 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 4212 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe -
resource yara_rule behavioral2/memory/3812-1-0x0000000000630000-0x00000000006FA000-memory.dmp dcrat behavioral2/files/0x000700000002341a-33.dat dcrat behavioral2/files/0x0004000000022a80-80.dat dcrat behavioral2/memory/3208-137-0x00000000004B0000-0x000000000057A000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 7e8d92bf51d41fd9244051c68f98c660N.exe -
Executes dropped EXE 1 IoCs
pid Process 3208 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\grb\\RuntimeBroker.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files (x86)\\Google\\Temp\\sppsvc.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\idndl\\RuntimeBroker.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Documents and Settings\\sysmon.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Windows\\uk-UA\\OfficeClickToRun.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\Windows.UI.Accessibility\\lsass.exe\"" 7e8d92bf51d41fd9244051c68f98c660N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\idndl\RCX815A.tmp 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\Windows.UI.Accessibility\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\grb\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\System32\grb\RuntimeBroker.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\idndl\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\System32\Windows.UI.Accessibility\RCX79D5.tmp 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\System32\Windows.UI.Accessibility\lsass.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\System32\grb\RCX7C57.tmp 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\System32\idndl\RuntimeBroker.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\Windows.UI.Accessibility\lsass.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\grb\RuntimeBroker.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\System32\idndl\RuntimeBroker.exe 7e8d92bf51d41fd9244051c68f98c660N.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\sppsvc.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Program Files (x86)\Google\Temp\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Program Files (x86)\Google\Temp\RCX7ED9.tmp 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Program Files (x86)\Google\Temp\sppsvc.exe 7e8d92bf51d41fd9244051c68f98c660N.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\uk-UA\OfficeClickToRun.exe 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\uk-UA\e6c9b481da804f07baff8eff543b0a1441069b5d 7e8d92bf51d41fd9244051c68f98c660N.exe File opened for modification C:\Windows\uk-UA\RCX77D1.tmp 7e8d92bf51d41fd9244051c68f98c660N.exe File created C:\Windows\uk-UA\OfficeClickToRun.exe 7e8d92bf51d41fd9244051c68f98c660N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 7e8d92bf51d41fd9244051c68f98c660N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4924 schtasks.exe 4088 schtasks.exe 2080 schtasks.exe 3956 schtasks.exe 2916 schtasks.exe 3216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 3812 7e8d92bf51d41fd9244051c68f98c660N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3812 7e8d92bf51d41fd9244051c68f98c660N.exe Token: SeDebugPrivilege 3208 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3208 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 97 PID 3812 wrote to memory of 3208 3812 7e8d92bf51d41fd9244051c68f98c660N.exe 97 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 7e8d92bf51d41fd9244051c68f98c660N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e8d92bf51d41fd9244051c68f98c660N.exe"C:\Users\Admin\AppData\Local\Temp\7e8d92bf51d41fd9244051c68f98c660N.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3812 -
C:\Windows\System32\grb\RuntimeBroker.exe"C:\Windows\System32\grb\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\uk-UA\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\Windows.UI.Accessibility\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\grb\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\idndl\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Documents and Settings\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD5e6d29c8b87e99a6473778d0a1c6426bf
SHA124fa66e81e27e3dd894949852f7b66c90c0ca6d0
SHA2563b0192e7a83e123e72767aaf4af18066741b4a0ef20a5715c943963c109a0f67
SHA512404d5c3a1d888f574dc681b906bd047cbac5f857919667dc7893d1569fc5ec704adc7d38c71bb72790bfedf3ec339f3499d9a1dd4ab731e086997d00a49ccff7
-
Filesize
783KB
MD57e8d92bf51d41fd9244051c68f98c660
SHA1f7ac88a58fd24243402e8f1e454fdd08ec2c3a82
SHA25627907524a6f24a23303903dd2f8a230cc020401ec15e0f9579dd2c11a5c92a3a
SHA51231b4357c81f32661558e5692a005e87d7642f9345474af1c46ba22f8856660fce87a9d662ea53dea13719c125666f9a5c00dc6c4825015de3ab7b6e22459ba58